☆10Jan 14, 2015Updated 11 years ago
Alternatives and similar repositories for vulCheckerFirefox
Users that are interested in vulCheckerFirefox are comparing it to the libraries listed below
Sorting:
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- ☆23May 22, 2023Updated 2 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆19Oct 16, 2024Updated last year
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- IPython Notebook for Sentiment Classification☆10Nov 12, 2014Updated 11 years ago
- ☆17Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆11Oct 30, 2019Updated 6 years ago
- The Italian card game Scopa, built with Meteor. Demo application for a "Building a Multi-Player Game with Meteor" screencast course for T…☆10May 5, 2014Updated 11 years ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- Python library to get the Alexa rank of the domain of any URL☆10Jan 28, 2013Updated 13 years ago
- ☆12Nov 4, 2012Updated 13 years ago
- token exchange as a service☆11Updated this week
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Jan 11, 2026Updated last month
- Data Science Course Materials - Fall 2014☆12Sep 6, 2014Updated 11 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Mar 29, 2019Updated 6 years ago
- ☆10Aug 2, 2016Updated 9 years ago
- Director (web3)☆11Jun 5, 2020Updated 5 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated 10 months ago
- Code for various active transfer learning projects.☆10Feb 9, 2015Updated 11 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Implements several Markov chain Monte Carlo (MCMC) algorithms for the latent Dirichlet allocation (LDA) model☆11Feb 11, 2020Updated 6 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- Modern library for Linear and Integer Programming with Python 3☆11Jul 22, 2019Updated 6 years ago
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- Fortify enables web applications to use smart cards, local certificate stores and do certificate enrollment. This is the "Tool" applicati…☆16Jan 22, 2026Updated last month
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆18Jun 9, 2023Updated 2 years ago
- iOS Sample Application with AppAuth☆11Dec 4, 2017Updated 8 years ago
- Arxiv crawler written in python☆13Jun 17, 2012Updated 13 years ago
- A copy of the source for Grinstead and Snell's lovely probability book☆14Dec 20, 2015Updated 10 years ago
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated 2 weeks ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆38Oct 23, 2025Updated 4 months ago
- 安全风险评估管理系统☆11Jun 27, 2015Updated 10 years ago
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated last week