clearbluejar / cve-markdown-chartsView external linksLinks
A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.
☆47Dec 5, 2022Updated 3 years ago
Alternatives and similar repositories for cve-markdown-charts
Users that are interested in cve-markdown-charts are comparing it to the libraries listed below
Sorting:
- ☆16Mar 26, 2024Updated last year
- PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)☆44Jul 16, 2024Updated last year
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 4 years ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated 11 months ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- ☆14Jul 29, 2024Updated last year
- File Capability Extractor☆14Jul 12, 2025Updated 7 months ago
- Join the REVEN community. Ask questions, talk about reverse engineering, discuss REVEN, and show off your work!☆13Nov 30, 2021Updated 4 years ago
- Python Command-Line Ghidra Decompiler☆125Jan 6, 2026Updated last month
- Python Command-Line Ghidra Binary Diffing Engine☆738Sep 25, 2025Updated 4 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 4 months ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Apr 2, 2024Updated last year
- ☆20Jun 26, 2024Updated last year
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- ☆20Jul 19, 2021Updated 4 years ago
- ☆25Aug 6, 2025Updated 6 months ago
- ☆41Jun 23, 2024Updated last year
- Semantic code search tool with GPU acceleration☆57Dec 1, 2025Updated 2 months ago
- ☆21Jul 4, 2022Updated 3 years ago
- ☆26Feb 9, 2023Updated 3 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Windows process injection methods☆19Aug 11, 2019Updated 6 years ago
- ☆25Nov 24, 2025Updated 2 months ago
- Secretly record audio and video with chromium based browsers.☆23Feb 14, 2024Updated 2 years ago
- C2 Automation using Linode☆85Sep 24, 2022Updated 3 years ago
- GTPv1/GTPv2 Dialer☆30Nov 26, 2025Updated 2 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆28Jan 22, 2025Updated last year
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 6 years ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆51Dec 11, 2021Updated 4 years ago
- ☆57Feb 16, 2025Updated 11 months ago
- Ghidra Headless Python VScode Skeleton with Devcontainer Super Powers☆61Jun 27, 2025Updated 7 months ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- ☆30Sep 5, 2025Updated 5 months ago