A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.
☆48Dec 5, 2022Updated 3 years ago
Alternatives and similar repositories for cve-markdown-charts
Users that are interested in cve-markdown-charts are comparing it to the libraries listed below
Sorting:
- ☆16Mar 26, 2024Updated last year
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- File Capability Extractor☆14Jul 12, 2025Updated 7 months ago
- ☆14Jul 29, 2024Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆741Sep 25, 2025Updated 5 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Python Command-Line Ghidra Decompiler☆131Jan 6, 2026Updated 2 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Apr 2, 2024Updated last year
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- ☆25Aug 6, 2025Updated 7 months ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- Fuzz WebSockets with custom Python code☆20Aug 21, 2024Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- ☆20Jul 19, 2021Updated 4 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Mar 20, 2022Updated 3 years ago
- ☆27Feb 9, 2023Updated 3 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- ☆20Jul 4, 2022Updated 3 years ago
- Semantic code search tool with GPU acceleration☆59Dec 1, 2025Updated 3 months ago
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- Windows process injection methods☆19Aug 11, 2019Updated 6 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- ☆25Nov 24, 2025Updated 3 months ago
- Secretly record audio and video with chromium based browsers.☆23Feb 14, 2024Updated 2 years ago
- C2 Automation using Linode☆85Sep 24, 2022Updated 3 years ago
- ☆58Feb 16, 2025Updated last year
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆51Dec 11, 2021Updated 4 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Ghidra Headless Python VScode Skeleton with Devcontainer Super Powers☆61Jun 27, 2025Updated 8 months ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- ☆160Jan 27, 2025Updated last year
- ☆25Jun 15, 2025Updated 8 months ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Jun 30, 2023Updated 2 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Aug 29, 2021Updated 4 years ago
- ☆30Sep 5, 2025Updated 6 months ago