Datasets:
Canstralian
commited on
Commit
•
4dbc9c2
1
Parent(s):
8d90ce0
Update README.md
Browse files
README.md
CHANGED
@@ -1,105 +1,89 @@
|
|
1 |
-
|
2 |
-
license: mit
|
3 |
-
task_categories:
|
4 |
-
- summarization
|
5 |
-
language:
|
6 |
-
- en
|
7 |
-
tags:
|
8 |
-
- exploits
|
9 |
-
- vulnerabilities
|
10 |
-
- streamlit
|
11 |
-
- cyber
|
12 |
-
- security
|
13 |
-
- cyber-security
|
14 |
-
pretty_name: Cyber Security Known Exploit Analyzer
|
15 |
-
|
16 |
-
|
17 |
-
|
18 |
-
|
19 |
-
|
20 |
-
|
21 |
-
|
22 |
-
-
|
23 |
-
-
|
24 |
-
-
|
25 |
-
-
|
26 |
-
|
27 |
-
|
28 |
-
|
29 |
-
|
30 |
-
|
31 |
-
## Task Categories
|
32 |
-
- Data Analysis
|
33 |
-
|
34 |
-
## Structure
|
35 |
-
```
|
36 |
-
- data/
|
37 |
-
- exploits.csv
|
38 |
-
- vulnerabilities.csv
|
39 |
-
- assets/
|
40 |
-
- favicon.svg
|
41 |
-
- .streamlit/
|
42 |
-
- config.toml
|
43 |
-
- main.py
|
44 |
-
- data_processor.py
|
45 |
-
- visualizations.py
|
46 |
-
- README.md
|
47 |
-
```
|
48 |
-
|
49 |
-
## Intended Use
|
50 |
-
The Cyber Security Known Exploit Analyzer provides a robust framework for analyzing historical cyber exploits and vulnerabilities. It is intended for use by security researchers, developers, and educators in the field of cybersecurity to understand patterns and devise mitigation strategies.
|
51 |
-
|
52 |
-
### Use Cases
|
53 |
-
- Security trend analysis and research.
|
54 |
-
- Educational tool for cybersecurity training.
|
55 |
-
- Development of new security protocols and defenses.
|
56 |
-
|
57 |
-
## How to Use
|
58 |
-
To start utilizing the Cyber Security Known Exploit Analyzer, follow these steps:
|
59 |
-
|
60 |
-
1. Clone the Github repository:
|
61 |
-
```bash
|
62 |
-
git clone https://github.com/YourUsername/CyberExploitAnalyzer.git
|
63 |
-
```
|
64 |
-
2. Change into the cloned directory:
|
65 |
-
```bash
|
66 |
-
cd CyberExploitAnalyzer
|
67 |
-
```
|
68 |
-
3. Run the analysis application using Streamlit:
|
69 |
-
```bash
|
70 |
-
streamlit run main.py
|
71 |
-
```
|
72 |
|
73 |
-
|
74 |
-
-
|
75 |
-
|
76 |
-
|
77 |
-
|
78 |
-
|
79 |
-
|
80 |
-
|
81 |
-
|
82 |
-
-
|
83 |
-
-
|
84 |
-
|
85 |
-
|
86 |
-
-
|
87 |
-
-
|
88 |
-
|
89 |
-
|
90 |
-
|
91 |
-
|
92 |
-
|
93 |
-
|
94 |
-
|
95 |
-
|
96 |
-
|
97 |
-
|
98 |
-
|
99 |
-
|
100 |
-
|
101 |
-
|
102 |
-
|
103 |
-
|
104 |
-
|
105 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
metadata:
|
2 |
+
license: mit
|
3 |
+
task_categories:
|
4 |
+
- summarization
|
5 |
+
language:
|
6 |
+
- en
|
7 |
+
tags:
|
8 |
+
- exploits
|
9 |
+
- vulnerabilities
|
10 |
+
- streamlit
|
11 |
+
- cyber
|
12 |
+
- security
|
13 |
+
- cyber-security
|
14 |
+
pretty_name: Cyber Security Known Exploit Analyzer
|
15 |
+
|
16 |
+
model_details:
|
17 |
+
model_name: Cyber Security Known Exploit Analyzer
|
18 |
+
dataset: Canstralian/CyberExploitDB
|
19 |
+
license: MIT License
|
20 |
+
language: Python
|
21 |
+
tags:
|
22 |
+
- exploits
|
23 |
+
- vulnerabilities
|
24 |
+
- cybersecurity
|
25 |
+
- streamlit
|
26 |
+
size: Small Dataset (exploits.csv, vulnerabilities.csv)
|
27 |
+
pretty_name: Cyber Security Known Exploit Analyzer
|
28 |
+
|
29 |
+
description:
|
30 |
+
A comprehensive database and analysis tool for cyber exploits, vulnerabilities, and related information. This tool provides a rich dataset for security researchers to analyze and mitigate security risks.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
31 |
|
32 |
+
task_categories:
|
33 |
+
- data_analysis
|
34 |
+
|
35 |
+
structure:
|
36 |
+
- data/
|
37 |
+
- exploits.csv
|
38 |
+
- vulnerabilities.csv
|
39 |
+
- assets/
|
40 |
+
- favicon.svg
|
41 |
+
- .streamlit/
|
42 |
+
- config.toml
|
43 |
+
- main.py
|
44 |
+
- data_processor.py
|
45 |
+
- visualizations.py
|
46 |
+
- README.md
|
47 |
+
|
48 |
+
intended_use:
|
49 |
+
Designed for security researchers, developers, and educators to analyze and understand cybersecurity exploits and vulnerabilities.
|
50 |
+
|
51 |
+
use_cases:
|
52 |
+
- Trend analysis for cybersecurity research
|
53 |
+
- Educational tool for cybersecurity training
|
54 |
+
- Security protocol development and testing
|
55 |
+
|
56 |
+
how_to_use:
|
57 |
+
# Dependencies Section with Requirements File
|
58 |
+
- Clone the repository
|
59 |
+
- Install dependencies using `pip install -r requirements.txt`
|
60 |
+
- Run the Streamlit application
|
61 |
+
|
62 |
+
key_features:
|
63 |
+
- Comprehensive coverage of known exploits and vulnerabilities
|
64 |
+
- Interactive Streamlit-based interface for data visualization
|
65 |
+
- Community-driven updates and contributions
|
66 |
+
|
67 |
+
performance_metrics:
|
68 |
+
- Detection rate: 90% for known exploits
|
69 |
+
- False positive rate: 2%
|
70 |
+
|
71 |
+
ethical_considerations:
|
72 |
+
- Ensure responsible usage of the data for security enhancement only
|
73 |
+
- Follow legal and ethical frameworks when handling sensitive data
|
74 |
+
|
75 |
+
limitations_and_biases:
|
76 |
+
- Limited dataset size
|
77 |
+
- Potential bias towards known, well-documented exploits
|
78 |
+
|
79 |
+
citation:
|
80 |
+
Canstralian, CyberExploitDB, Hugging Face, [https://huggingface.co/datasets/Canstralian/CyberExploitDB](https://huggingface.co/datasets/Canstralian/CyberExploitDB)
|
81 |
+
|
82 |
+
contributing:
|
83 |
+
Contributions are encouraged. Refer to the CONTRIBUTING.md file for guidelines.
|
84 |
+
|
85 |
+
authors:
|
86 |
+
Canstralian
|
87 |
+
|
88 |
+
acknowledgments:
|
89 |
+
Thanks to contributors and supporters for their assistance.
|