A security-first linter for code that shouldn't need linting
☆18Sep 12, 2023Updated 2 years ago
Alternatives and similar repositories for lintML
Users that are interested in lintML are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- exploiting and defending neural networks(神经网络攻防专栏)☆15Mar 2, 2021Updated 5 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Aug 5, 2024Updated last year
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated last year
- Clang Static Analyzer with use-after-free and double-free checkers☆15Jul 24, 2015Updated 10 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- A simple way to exfiltrate data using spotify API☆20Feb 11, 2026Updated last month
- A tool to scan for .DS_Store files on webservers☆35Mar 28, 2021Updated 4 years ago
- ☆17Jan 9, 2025Updated last year
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- ☆28Jan 15, 2026Updated 2 months ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12May 20, 2022Updated 3 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- ☆30Jan 14, 2026Updated 2 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- Clang plugin with several static analysis checks☆28Jul 16, 2025Updated 8 months ago
- Code for ACL2018 HotFlip: White-Box Adversarial Examples for Text Classification, Word-level Adversarial Examples☆40Apr 20, 2019Updated 6 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆19Jul 25, 2025Updated 7 months ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 2 months ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- ☆11Feb 8, 2021Updated 5 years ago
- ☆49Feb 25, 2026Updated 3 weeks ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42May 9, 2020Updated 5 years ago
- ☆13Dec 30, 2024Updated last year
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- This repository contains notebooks showing how to perform mixed precision training in tf.keras 2.0☆12Dec 15, 2019Updated 6 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆24Jun 14, 2023Updated 2 years ago
- The state of the art, modular, portable and easily extensible MITM framework in a Docker Container.☆14Dec 30, 2017Updated 8 years ago
- A library for building tools to determine if vulnerabilities are reachable in a code base.☆17Aug 19, 2025Updated 7 months ago