History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.
☆10Apr 1, 2024Updated last year
Alternatives and similar repositories for xz-backdoor-github
Users that are interested in xz-backdoor-github are comparing it to the libraries listed below
Sorting:
- utilities to facilitate working with codebases that don't ascribe to normal package management paradigms, e.g. ML research code that can …☆13Nov 26, 2022Updated 3 years ago
- public-pentesting-reports☆12Aug 23, 2016Updated 9 years ago
- The Data Product Specification☆11Jan 28, 2025Updated last year
- Data Contract Manager (Community Edition)☆15Sep 8, 2024Updated last year
- Dumping processes using a kernel-mode driver.☆20Nov 10, 2021Updated 4 years ago
- A platform to manage the data product life cycle☆22Mar 11, 2026Updated last week
- Discover the China's map deviation algorithm☆11Jun 30, 2025Updated 8 months ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- ☆19Mar 23, 2025Updated 11 months ago
- CTF Write-Ups☆19Jan 19, 2020Updated 6 years ago
- Generate pydantic models from JSON Schema☆23Sep 19, 2023Updated 2 years ago
- GitIngest VS Code Extension☆23Mar 15, 2025Updated last year
- Crappy shell script that port scans using curl☆13May 3, 2017Updated 8 years ago
- ☆17Oct 2, 2023Updated 2 years ago
- Code from my "game modding" livestreams! Follow along and learn☆36Sep 6, 2021Updated 4 years ago
- Veracruz branches of https://gitlab.com/arm-research/security/icecap/icecap☆19Jan 22, 2024Updated 2 years ago
- ☆17Oct 21, 2023Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- GPThreatIntel-Summarizer is a Python tool that uses OpenAI models and CTI to automate report summarization. Extract key insights from CTI…☆21Feb 6, 2024Updated 2 years ago
- poetry plugin to freeze dependency versions in wheels☆29Feb 13, 2025Updated last year
- My OSCP cheat sheet☆22Aug 4, 2024Updated last year
- Creating Markov chain-generated Hacker News headlines with Python☆12Aug 24, 2015Updated 10 years ago
- Resk is a robust Python library designed to enhance security and manage context when interacting with LLMs. It provides a protective …☆16Dec 19, 2025Updated 3 months ago
- ☆12Dec 26, 2021Updated 4 years ago
- ☆12Oct 18, 2019Updated 6 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Feb 9, 2018Updated 8 years ago
- Repository for tools used for the OSCP☆23Sep 18, 2025Updated 6 months ago
- Intelligent invoices with LaTeX3☆18Sep 24, 2018Updated 7 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 5 years ago
- Generate CPG for multiple languages for code and threat analysis☆11Sep 22, 2023Updated 2 years ago
- A c++ implementation of the Two-Pass Pairing Heap data structure.☆11Oct 9, 2016Updated 9 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- A simple and very light Neovim bufferline☆15Nov 19, 2025Updated 4 months ago
- simple command line for various AWS management tasks☆23Dec 4, 2025Updated 3 months ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Boost your network's security with our services in Wireless Penetration Testing. We offer comprehensive vulnerability assessments, identi…☆18Feb 4, 2024Updated 2 years ago
- CTF (Capture The Flag) writeups, code snippets, scripts☆16Oct 18, 2018Updated 7 years ago
- Scripts to automate creation your own VPN or Proxy server☆18Aug 7, 2020Updated 5 years ago