Reproduction package for the paper "A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites" in the Evaluation and Assessment in Software Engineering (EASE) 2021
-
Updated
Mar 16, 2022 - Python
Reproduction package for the paper "A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites" in the Evaluation and Assessment in Software Engineering (EASE) 2021
Security in the context of Software-Source code analysis, Buffer Overflow and Web Security
Threat modeling of an open-source VPN Client - OpenConnect using Microsoft Threat Modeling Tool
The compilation of demos and proof of concepts of vulnerability exploits of SSL/TLS protocol and related libraries
Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated Software Engineering (ASE) 2021
Automated privilege escalation of the world's most popular Docker images.
An ever-growing list of resources for data-driven vulnerability assessment and prioritization
Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)
Find CVE PoCs on GitHub
Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
Vulnerability Information Aggregator for CVEs
Finding potential software vulnerabilities from git commit messages
Gather and update all available and newest CVEs with their PoC.
Add a description, image, and links to the software-vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the software-vulnerability topic, visit your repo's landing page and select "manage topics."