leojcollard / cve-search-docker
☆16Updated 8 years ago
Alternatives and similar repositories for cve-search-docker:
Users that are interested in cve-search-docker are comparing it to the libraries listed below
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Dockerized cve-search as a web app☆16Updated 7 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- ☆20Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- ☆10Updated 2 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆10Updated 7 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- ☆32Updated 9 months ago
- Abusing the FreeBSD MAC framework for rootkits☆11Updated 7 years ago
- Env Scraper for Linux Post Exploitation☆9Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- ☆36Updated 5 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Basic file metadata gathering script☆21Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- ☆27Updated 3 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago