Software Vulnerabilities to Weakness Mapping
☆23Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for V2W-BERT
Users that are interested in V2W-BERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆25May 16, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 5 months ago
- TypeScript/JavaScript client libraries for Sliver☆25Mar 15, 2026Updated last week
- It records your screenshots and code, then lets you upload to ASHIRT☆57Feb 11, 2026Updated last month
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated 2 months ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Dec 29, 2023Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- ⍺-MON anonymizes network traffic in real time. This software process network traffic on input interfaces to remove privacy sensitive info…☆12Sep 27, 2021Updated 4 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 4 months ago
- Render The Art of the Command Line to standalone HTML via R Markdown☆10Jun 1, 2019Updated 6 years ago
- CVE-2020-10204 远程命令执行脚本☆13May 27, 2020Updated 5 years ago
- Learning Scala Programming, published by Packt☆11Jan 30, 2023Updated 3 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- A template tool with no dependencies that works like Helm templates or Consul templates.☆17Mar 3, 2026Updated 2 weeks ago
- A PowerShell wrapper for certutil.exe☆20Updated this week
- ☆15Aug 20, 2025Updated 7 months ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Ansi-Cat - A utility to play back .ans files with using ansi.sys on windows☆11Nov 11, 2017Updated 8 years ago
- GNU Unifont hex fonts☆10Mar 12, 2025Updated last year
- ☆10May 25, 2023Updated 2 years ago
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 3 months ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Minimal JavaScript Playground ⌨️☆13Apr 6, 2023Updated 2 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- 🔀 Tools to Organize and Visualize Tweets Including Tweet Threads (WIP)☆10Apr 25, 2018Updated 7 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- A simple program to automate Microsoft OAuth device code phishing attacks.☆19Feb 15, 2024Updated 2 years ago
- R package with Classes and Methods for Fast Memory-Efficient Boolean Selections☆13May 6, 2025Updated 10 months ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Mar 27, 2020Updated 5 years ago