Read and write Fortify Project (FPR) files in Python
☆42Aug 20, 2019Updated 6 years ago
Alternatives and similar repositories for python-fortify
Users that are interested in python-fortify are comparing it to the libraries listed below
Sorting:
- Read and write Fortify Project (FPR) files in Python☆10Sep 18, 2014Updated 11 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- 安全升级jar包时,辅助检测Java Archive (JAR) 包之间兼容性,各类符号引用的存在检测,包括方法、方法签名、字段定义和引用、类引用等等☆14Jul 7, 2024Updated last year
- A comprehensive curated list of available Blockchain Bug Bounty Programs.☆79Feb 22, 2019Updated 7 years ago
- ☆16Sep 20, 2023Updated 2 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- log4j-patch 修改字节码实现补丁防御☆20Dec 10, 2021Updated 4 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- This is a Cheatsheet for CTF Challenges categorized by different Privilege Escalation Methods☆28Aug 21, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Slides, papers, etc☆33Mar 26, 2024Updated last year
- An automated setup for fuzzing Redis w/ AFL++☆35Mar 12, 2022Updated 3 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆82Mar 19, 2024Updated last year
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- 《区块链背后的密码学》☆28Aug 1, 2019Updated 6 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- 团队更名为 QAX A-TEAM☆10Apr 28, 2019Updated 6 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- 【python】利用百度语音识别API,百度语音合成API,图灵机器人API实现简单的对话机器人☆10Mar 13, 2021Updated 4 years ago
- 存 放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- This command can be run to watch a cgroup for OOM events and run some subcommand.☆14Dec 11, 2014Updated 11 years ago
- Sign.AI is a Sign Language Recognition application built on top of MediaPipe and uses Computer Vision to Recognize Hand Signs from a user…☆16Jun 17, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated 3 weeks ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- These are helping scripts to automate my work☆14Jun 18, 2021Updated 4 years ago
- 基于Java ASM技术和GadgetInspector的原理,尝试实现一个自动Java代码审计工具。目前做到了可控参数分析和数据流跟踪分析☆39Oct 26, 2021Updated 4 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- A command-line parser for Standard ML☆21Dec 29, 2025Updated last month
- Cloudify Resources for Cloudify Plugins☆10Jun 20, 2019Updated 6 years ago