☆17Feb 3, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-vulns
Users that are interested in CVE-vulns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Aug 20, 2025Updated 8 months ago
- Static analysis for llvm☆20Mar 31, 2015Updated 11 years ago
- This repository contain recurring IoT vulnerabilities found by FirmRec.☆17Aug 25, 2023Updated 2 years ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Jun 22, 2025Updated 10 months ago
- 提供burpsuite扫描规则的项目,后期会有持续更新。☆11Feb 12, 2022Updated 4 years ago
- ☆31Sep 4, 2022Updated 3 years ago
- ☆11Apr 15, 2026Updated 3 weeks ago
- EmbedThis GoAhead Embedded Web Server☆27Dec 10, 2025Updated 4 months ago
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- ☆56Aug 30, 2022Updated 3 years ago
- ☆10Jun 5, 2023Updated 2 years ago
- ☆27Aug 6, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- NES emulator written in python☆11Sep 9, 2024Updated last year
- build gdb static for all support arch☆26Apr 27, 2022Updated 4 years ago
- It's me!! So cute!!!☆15Apr 14, 2026Updated 3 weeks ago
- ACVPatcher patches AndroidManifest and rewrites DEX files inside an APK not touching resources (unlike apktool)☆12Mar 1, 2026Updated 2 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆121Feb 25, 2026Updated 2 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated this week
- CVE-2014-10069☆11Jan 7, 2018Updated 8 years ago
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 4 months ago
- The way to get your password which has restored in your localhost by chrome.☆25Apr 2, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Trophy list of zero-day vulnerabilities that I discovered☆13May 6, 2024Updated 2 years ago
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆12Jan 31, 2024Updated 2 years ago
- ☆24Jan 27, 2026Updated 3 months ago
- Compare two binary files☆27Mar 17, 2021Updated 5 years ago
- Library and tools to access the Common Log File System (CLFS)☆26Dec 4, 2025Updated 5 months ago
- ☆15Mar 22, 2021Updated 5 years ago
- bypass 401/403☆13Sep 13, 2022Updated 3 years ago
- ☆16Apr 14, 2023Updated 3 years ago
- ☆18Aug 15, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CVE-2022-0847 POC and Docker and Analysis write up☆25Mar 10, 2022Updated 4 years ago
- Archive for acez.re blog.☆21Apr 17, 2023Updated 3 years ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- Documentation for Vilo router vulnerability research☆15Oct 21, 2024Updated last year
- For V8CTF M123☆17Aug 25, 2024Updated last year
- 4D Fuzzer is a fuzzer for fuzzing programs that use MAVLink written in Python3.☆15Dec 16, 2021Updated 4 years ago
- ☆19Jun 25, 2025Updated 10 months ago