Rezilion / mi-x
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
β140Updated last year
Alternatives and similar repositories for mi-x:
Users that are interested in mi-x are comparing it to the libraries listed below
- Find CVE PoCs on GitHubβ142Updated last year
- Command line fuzzer and bruteforcer πͺ wfuzz for commandβ85Updated 2 years ago
- β115Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talksβ64Updated 2 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.β59Updated 2 months ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.β206Updated 2 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, anβ¦β140Updated last year
- Cisco ASA Software and ASDM Security Researchβ80Updated 2 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock β¦β181Updated 3 months ago
- A GraphQL enumeration and extraction toolβ129Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.β64Updated 9 months ago
- A source code static analysis platform for AppSec enthusiasts.β231Updated last week
- Hourly updated database of exploit and exploitation reportsβ254Updated last week
- β196Updated 3 months ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stagβ¦β87Updated last year
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β132Updated last year
- Source Code Management Attack Toolkitβ212Updated 2 years ago
- β179Updated 2 months ago
- First iteration of ML based Feedback WAFβ58Updated 10 months ago
- β104Updated 2 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilitiesβ70Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports fβ¦β141Updated 2 years ago
- β110Updated last year
- A curated list of argument injection vectorsβ40Updated this week
- PoC and Detection for CVE-2024-21626β72Updated 11 months ago
- β72Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.β241Updated 2 years ago
- PoC_CVEsβ159Updated 3 weeks ago
- Manager of third-party sources of Semgrep rules πβ78Updated 6 months ago
- Link sources to sinks in C# applications.β142Updated last year