A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.
☆47Dec 5, 2022Updated 3 years ago
Alternatives and similar repositories for cve-markdown-charts
Users that are interested in cve-markdown-charts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆74Apr 2, 2024Updated 2 years ago
- ☆25Aug 6, 2025Updated 8 months ago
- ☆16Mar 26, 2024Updated 2 years ago
- Exploit of RealVNC VNC Server☆27Oct 18, 2022Updated 3 years ago
- Python Command-Line Ghidra Binary Diffing Engine☆751Sep 25, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago
- Ghidra Headless Python VScode Skeleton with Devcontainer Super Powers☆61Jun 27, 2025Updated 9 months ago
- BINARLY Research Tools and PoCs☆39Sep 27, 2024Updated last year
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- ☆26Nov 24, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code Search on Fess☆11Nov 2, 2024Updated last year
- GraphFuzz is an experimental framework for building structure-aware, library API fuzzers.☆10Apr 21, 2022Updated 3 years ago
- PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)☆46Jul 16, 2024Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- ☆42Jun 23, 2024Updated last year
- Small binja plugin to import header file to types☆17Nov 11, 2022Updated 3 years ago
- Easy Anti PatchGuard☆10Apr 9, 2021Updated 5 years ago
- ☆27Feb 9, 2023Updated 3 years ago
- GDT (Ghidra Data Type) generated from IDA tils☆22Mar 10, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code Coverage Exploration Plugin for Ghidra☆379Jul 19, 2024Updated last year
- ☆20Jun 26, 2024Updated last year
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆116Jan 31, 2025Updated last year
- Windows process injection methods☆20Aug 11, 2019Updated 6 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- ☆28Mar 29, 2022Updated 4 years ago
- C2 Automation using Linode☆86Sep 24, 2022Updated 3 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Semantic code search tool with GPU acceleration☆61Dec 1, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Jul 29, 2024Updated last year
- PowerShell PE Parser☆63Jun 28, 2024Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- A collection of widely-fuzzed targets☆46Aug 4, 2019Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated 2 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆34Sep 17, 2025Updated 7 months ago