yingdongucas / inconsistency_detectionView external linksLinks
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
☆75Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for inconsistency_detection
Users that are interested in inconsistency_detection are comparing it to the libraries listed below
Sorting:
- A library for parsing security advisories☆13Feb 5, 2026Updated last week
- Extract useful semantic from CVE descriptions usinig NLP☆25Jan 4, 2023Updated 3 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- CyberAttack Sensing and Information Extraction☆73Dec 26, 2024Updated last year
- Source-binary patch presence test system.☆27Mar 21, 2020Updated 5 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 5 months ago
- CTI database generator and public dataset☆21Jan 12, 2020Updated 6 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- 企业级安全智能化实践☆70Mar 16, 2022Updated 3 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Graph database version of the CVE database☆26Dec 8, 2022Updated 3 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- A cms system for Sichuan University CTF Association☆10Mar 4, 2020Updated 5 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- ☆25Feb 21, 2019Updated 6 years ago
- This is a project source for NER in cybersecurity threat intelligence☆22Jul 4, 2022Updated 3 years ago
- scu-ctf平台上题目的Writeup☆13Oct 30, 2023Updated 2 years ago
- JoanAudit - A security slicing tool that helps security auditors to perform their security auditing tasks more efficiently☆10Sep 6, 2017Updated 8 years ago
- Python 3 bridge to IDA's Python environment☆17Aug 27, 2020Updated 5 years ago
- Detecting software vulnerability described public security reports with minimal training examples☆14Jun 11, 2021Updated 4 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- This repository contains a list of papers about software supply chain☆29May 22, 2024Updated last year
- An implementation of BERT for cybersecurity named entity recognition☆26Nov 13, 2020Updated 5 years ago
- A PyTorch implementation of the ACM SIGKDD 2021 paper titled "PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-base…☆17Dec 19, 2023Updated 2 years ago
- A Django project to help users to create free, fast and secure blogs on GitHub Pages and Jekyll.☆21Dec 8, 2022Updated 3 years ago
- ☆15Jul 27, 2023Updated 2 years ago
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 9 years ago
- ☆16Sep 12, 2018Updated 7 years ago
- ☆13May 19, 2021Updated 4 years ago
- Packaging Metadata Comparions☆18Apr 3, 2020Updated 5 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆73Jul 23, 2025Updated 6 months ago
- A Transformer-based Line-Level Vulnerability Prediction☆160Aug 5, 2024Updated last year
- ML research on software vulnerabilities☆18Sep 8, 2019Updated 6 years ago
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- A pure python rpm reader☆20Apr 11, 2024Updated last year
- QEmu backend for avatar²☆22Mar 29, 2025Updated 10 months ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago