Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆29Mar 7, 2024Updated 2 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- Public OCI-Image (docker image) Security Checker☆21Feb 16, 2026Updated 2 months ago
- ☆11Jun 30, 2025Updated 10 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆23Mar 29, 2022Updated 4 years ago
- Example rabbitmq rpc pattern using messaging pattern (Request & Reply)☆12Aug 23, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/fuzzdb☆13Mar 23, 2015Updated 11 years ago
- A list of potentially useful bookmarklets☆14Jan 17, 2023Updated 3 years ago
- Ini merupakan API Pembelajaran yang saya buat yaitu API Gombal☆10Nov 11, 2021Updated 4 years ago
- Go Damn Vulnerable Web App☆24Jul 16, 2024Updated last year
- An advance keylogger that works and also logs special keys.