leojcollard / cve-search-dockerLinks
☆16Updated 8 years ago
Alternatives and similar repositories for cve-search-docker
Users that are interested in cve-search-docker are comparing it to the libraries listed below
Sorting:
- Dockerized cve-search as a web app☆16Updated 7 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆76Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Gandcrab v5.2 decryption scripts☆15Updated 5 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Updated last year
- ☆17Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- NTPD remote DOS exploit and vulnerable container☆24Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- upstream for seccheck☆15Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆20Updated 7 years ago