clearbluejar / cve-markdown-chartsLinks
A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.
☆45Updated 3 years ago
Alternatives and similar repositories for cve-markdown-charts
Users that are interested in cve-markdown-charts are comparing it to the libraries listed below
Sorting:
- Malware Analysis tools☆26Updated last year
- Tools that trigger False Positive AV alerts☆53Updated 11 months ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- ☆64Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated last month
- ☆116Updated 2 years ago
- YARI is an interactive debugger for YARA Language.☆89Updated 3 months ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- ☆49Updated 2 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆28Updated 2 years ago
- ☆18Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Google Chrome Use After Free☆61Updated 3 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Updated 3 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆70Updated last year
- LILO based Pulse Secure appliance disk image decryptor☆13Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- Dont Gamble with Risk☆14Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- ☆63Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago