fabric8-analytics / cvejob
A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).
β12Updated last year
Related projects β
Alternatives and complementary repositories for cvejob
- β15Updated 4 years ago
- Crowdsourced fuzzing cluster. πβ21Updated 3 years ago
- The Binary Mutation code based on Uroborosβ14Updated 5 years ago
- Bad packages from the pypi repositoryβ9Updated 5 years ago
- A place to systematically store software bill of materials (SBOM) documents.β44Updated last year
- Debugging library to quickly get the minimal crashing test caseβ34Updated 6 years ago
- Scan pypi for typosquattingβ37Updated last year
- Laniakea is a utility for managing instances at various cloud providers and aids in setting up a fuzzing cluster.β27Updated 3 years ago
- Default query sets for Joernβ24Updated 3 years ago
- β35Updated 4 years ago
- β23Updated 7 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.β19Updated 4 years ago
- β9Updated 5 years ago
- Our backup exploitation technique: fuzzing for POVs!β25Updated 8 years ago
- This repo has been migrated to https://github.com/github/security-lab/tree/master/CodeQL_Queriesβ25Updated 5 years ago
- β13Updated last month
- A fuzzy parser for C/C++ that creates semantic code property graphsβ35Updated 4 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMsβ12Updated 2 weeks ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)β22Updated 5 years ago
- Python module to detect, analyze and id application bugsβ21Updated 4 months ago
- Avalanche is a document generator which uses context-free grammars to generate randomized outputs for fuzz-testing.β32Updated 3 years ago
- Downloader for Firefox/jsshell builds for fuzzing.β37Updated this week
- A simple ssh private key password recovery tool written in Goβ22Updated 10 months ago
- Writeups of CTF challenges I doβ13Updated 5 years ago
- Linux-KVM with rVMI extensionsβ22Updated 7 years ago
- Underconstrained symbolic execution for cryptography verificationβ18Updated 3 years ago
- Low-effort reachability analysis for third-party code vulnerabilities.β19Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordinβ¦β59Updated last week
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.β11Updated 3 years ago
- β22Updated 2 years ago