一个用于生成cve数据库的程序并提供简单的http协议查询接口
☆29Apr 13, 2020Updated 5 years ago
Alternatives and similar repositories for cve-db
Users that are interested in cve-db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 三方依赖库扫描系统☆91Jun 10, 2021Updated 4 years ago
- OVAL Interpreter☆14Sep 14, 2020Updated 5 years ago
- Lambda function to be called in CloudWatch when GuardDuty sends logs to CloudWatch. This script will write the malicious IP to a dedicate…☆14May 13, 2023Updated 2 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- 一款集成了MurphySec CLI的GitLab代码仓库安全检测工具,10分钟检测仓库所有存量代码。☆43Mar 29, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This is simple kernel module can get and replace any linux syscall. Nowadays needs some hacks, on x86 platform. Can be used on ARM and x8…☆12Dec 25, 2012Updated 13 years ago
- Sep0lkit's Blog☆14Apr 18, 2020Updated 5 years ago
- A simple tool to do linux emergency check☆11Mar 16, 2020Updated 6 years ago
- automatic data race analysis for Linux device drivers☆12Jul 27, 2016Updated 9 years ago
- 学习使我快乐!☆14Updated this week
- ☆19Feb 11, 2026Updated last month
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 3 months ago
- ipstatistics is a script based on the ipip library that is used to quickly filter the ip list.☆14Aug 21, 2020Updated 5 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆13Jan 5, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A command line utility for managing Frida.☆23Jan 20, 2023Updated 3 years ago
- An Easy way to write JNI code in C++11☆15Nov 25, 2016Updated 9 years ago
- 冰蝎客户端源码☆14Apr 15, 2020Updated 5 years ago
- 灵芝IAST是一款交互式应用安全评估工具,覆盖了Java WEB相关安全风险的检测,具有近实时检测、准确率高、误报率低、漏洞链路 清晰等特点|使用之前请阅读官方文档☆16Jul 18, 2020Updated 5 years ago
- web form crack☆12May 10, 2016Updated 9 years ago
- The newest version of PatchNet☆14Nov 25, 2022Updated 3 years ago
- BurpCrypto officially confirms the supported JS library (BurpCrypto官方确认支持的JS库).☆12Sep 21, 2021Updated 4 years ago
- ☆10May 6, 2021Updated 4 years ago
- A Computational Graph Generator for AI Compiler Fuzzing☆16May 31, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 235,886 Words for Go☆12Nov 16, 2018Updated 7 years ago
- ☆14Aug 12, 2019Updated 6 years ago
- 修改 pyTranscriber 得到 cli 版的 mypyTranscriber☆10Jun 9, 2021Updated 4 years ago
- Thymeleaf SSTI Bypass☆13Nov 24, 2021Updated 4 years ago
- ☆18Sep 27, 2022Updated 3 years ago
- 剑网三交易行监控☆22Mar 13, 2017Updated 9 years ago
- Linux命令转发记录☆62Jul 15, 2019Updated 6 years ago
- Inflator is a Reaver Command Generator, create by Fast Light User-Interface Designer ("FLUID").☆13Apr 24, 2018Updated 7 years ago
- ☆19Apr 11, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- For our ICSE22 paper "EAGLE: Creating Equivalent Graphs to Test Deep Learning Libraries" by Jiannan Wang, Thibaud Lutellier, Shangshu Qia…☆13Aug 16, 2023Updated 2 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- a data collection of related work: Toward Understanding Deep Learning Framework Bugs☆17Oct 23, 2023Updated 2 years ago
- vulnerability database spider 爬取NVD、CNVD、CNNVD等漏洞数据库☆229Apr 28, 2021Updated 4 years ago
- ☆14May 13, 2018Updated 7 years ago
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆15May 28, 2024Updated last year