This is a dataset intended to train a LLM model for a completely CVE focused input and output.
☆66Jun 22, 2025Updated 9 months ago
Alternatives and similar repositories for CVE-llm_dataset
Users that are interested in CVE-llm_dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Dec 14, 2025Updated 3 months ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Jan 22, 2025Updated last year
- Convert PHP code into PHP opcode, use GaussianNB for training☆10Mar 21, 2020Updated 6 years ago
- hacking framework complete source-code for web, wifi, url, sql-injection and doing a complete web scan for starters.☆30Dec 8, 2022Updated 3 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆19Jul 19, 2024Updated last year
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆197Feb 5, 2026Updated last month
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆590Nov 9, 2024Updated last year
- Source code of smaller projects.☆27Feb 1, 2026Updated last month
- The fuzzing framework named SHADOWFUZZER to find clientside vulnerabilities when processing incoming MQTT messages.☆20May 10, 2023Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- The C4 Concurrent C Fuzzer☆14Nov 2, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- Decrypt TLS traffic from a pcap file☆28May 4, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An overview of LLMs for cybersecurity.☆1,271Mar 18, 2026Updated last week
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆176Oct 23, 2024Updated last year
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 7 months ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆341Feb 21, 2026Updated last month
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 4 years ago
- IotSan: Fortifying the Safety of IoT Systems (ACM CoNEXT'18)☆14Jan 30, 2019Updated 7 years ago
- Linux Auditing System logs pretty printer☆11Dec 22, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- [ICCV 2021] Multimodal Knowledge Expansion☆10Aug 28, 2021Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- ☆14Dec 22, 2015Updated 10 years ago
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Aug 24, 2022Updated 3 years ago
- A tree-sitter-grammar for cairo 1.0☆16Dec 14, 2022Updated 3 years ago
- software asset scanning orchestration system☆35Mar 19, 2026Updated last week
- ☆10Feb 10, 2020Updated 6 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆31Jan 8, 2026Updated 2 months ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆321Jul 30, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.☆10Aug 14, 2024Updated last year
- ☆10Jul 9, 2020Updated 5 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆61Jan 2, 2026Updated 2 months ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- ☆11Mar 5, 2023Updated 3 years ago
- FuzzBuilderEx is a system to build seed corpus and fuzzing executables using the test framework automatically.☆14Sep 6, 2022Updated 3 years ago