☆220Apr 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for Vulnerability-Disclosures
Users that are interested in Vulnerability-Disclosures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- CVE-2021-42342 RCE☆42Jan 4, 2022Updated 4 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated 2 years ago
- ☆399Mar 25, 2026Updated last month
- Static Binary Instrumentation tool for Windows x64 executables☆204Sep 29, 2025Updated 7 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- ☆80Feb 26, 2025Updated last year
- ☆60Aug 11, 2023Updated 2 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- ☆50Aug 11, 2023Updated 2 years ago
- ☆19Nov 17, 2019Updated 6 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,306Jun 1, 2023Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆44Feb 27, 2017Updated 9 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 6 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆46Jan 14, 2025Updated last year
- Audit python packages for known vulnerabilities☆34Mar 9, 2022Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Mar 21, 2026Updated last month
- ☆44Jul 11, 2025Updated 9 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,989Updated this week
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,620Apr 28, 2026Updated last week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,581Oct 16, 2025Updated 6 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Proof-of-Concept for CVE-2024-21345☆78Apr 26, 2024Updated 2 years ago
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Mar 15, 2017Updated 9 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,982Apr 28, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- ☆16Jun 23, 2024Updated last year
- ☆28Jan 10, 2024Updated 2 years ago
- ☆336Apr 6, 2026Updated last month
- Indicator of Compromise Scanner for CVE-2019-19781☆94Mar 25, 2020Updated 6 years ago
- win32k LPE☆464Jan 27, 2022Updated 4 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 2 months ago