leojcollard / cve-search-dockerLinks
☆16Updated 8 years ago
Alternatives and similar repositories for cve-search-docker
Users that are interested in cve-search-docker are comparing it to the libraries listed below
Sorting:
- Main repository to pull all Cisco related projects.☆15Updated 8 years ago
- Dockerized cve-search as a web app☆16Updated 7 years ago
- A fuzzing script for MitmProxy☆24Updated 10 years ago
- Symbol REPL☆31Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- ☆17Updated 7 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Updated 3 years ago
- r2yara - Module for Yara using radare2 information☆35Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 8 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 10 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- ☆20Updated 7 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- ☆16Updated 10 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated 2 weeks ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago