An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities
☆21Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for TimeGap-Theory
Users that are interested in TimeGap-Theory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- ☆17Feb 3, 2026Updated last month
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- ☆15Feb 9, 2022Updated 4 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Code coverage startup for C++ project using GCov and LCov☆14Jun 4, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- ☆37Jun 20, 2025Updated 9 months ago
- OWASP Foundation Web Respository☆19Dec 22, 2025Updated 3 months ago
- OWASP Foundation Web Respository☆22Feb 27, 2026Updated 3 weeks ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Fiati music font with Fingering Diagram for multiple musical instruments☆21Oct 31, 2023Updated 2 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 4 months ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- ☆13Dec 7, 2023Updated 2 years ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- ☆11Apr 10, 2018Updated 7 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- A framework for building behaviour-driven tests in fluent Java.☆35Mar 27, 2020Updated 5 years ago
- Scripts and Web Application for folk music tune transcription and recognition☆28Dec 5, 2024Updated last year
- Adds a guard to disable ObjectInputStream.readObject☆11Dec 6, 2015Updated 10 years ago
- deadsimple BSD Security Advisories and Announcements☆19Mar 12, 2026Updated last week
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated 3 months ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year