Received CVE list
☆12Dec 24, 2021Updated 4 years ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- Overview of Clone Detection Tools for Java☆14Aug 23, 2025Updated 8 months ago
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆21Updated this week
- BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software☆18Oct 10, 2023Updated 2 years ago
- A Web Platform API proposal for Blob URL☆10Feb 24, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆21Dec 1, 2019Updated 6 years ago
- defcon framework by SeoulPlusBadass☆18Dec 11, 2022Updated 3 years ago
- DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing☆17Feb 27, 2023Updated 3 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- Official implementation of the paper "From Optimization to Generalization: Fair Federated Learning against Quality Shift via Inter-Client…☆12Mar 13, 2025Updated last year
- ☆13Mar 22, 2024Updated 2 years ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- A small UPnP client☆11Apr 1, 2015Updated 11 years ago
- Open Theori Research Seminar☆18Jun 21, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is the our implementation for the paper: Exploring Mixed Information Flow for Cross-domain Sequential Recommendations☆12Aug 17, 2020Updated 5 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆176Dec 15, 2023Updated 2 years ago
- Dll注入/Hook/NtCreateThreadExProc/CreateRemoteThread☆14Jan 15, 2020Updated 6 years ago
- fork old V8 source(tag: 1.2.14.20), make it works for MacOS with CMake, for study purpose☆12Mar 25, 2023Updated 3 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆858Apr 11, 2026Updated 3 weeks ago
- Satori botnet variant☆13Mar 19, 2022Updated 4 years ago
- study launch anywhere and bundle mismatch bug☆17Apr 23, 2023Updated 3 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- ☆15Mar 19, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆15Aug 10, 2022Updated 3 years ago
- some sploits☆19Sep 20, 2024Updated last year
- ☆14Dec 29, 2019Updated 6 years ago
- ☆15Jan 24, 2021Updated 5 years ago
- DIR-850L A1 Firmware GPL source☆12Mar 9, 2020Updated 6 years ago
- 各种开源CMS 各种版本的漏洞以及EXP 该项目将不断更新☆10Mar 18, 2018Updated 8 years ago
- Test your mini, micro and A-A cables with this little device!☆13Aug 14, 2021Updated 4 years ago
- Examples demonstrating the usage of avatar²☆28Dec 9, 2023Updated 2 years ago
- Benchmark collection for analysis. The idea is to have a collection of projects in several languages as well as various sast applications…☆12Jan 7, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cross-platform CTF problem container manager☆23May 20, 2019Updated 6 years ago
- 一个PE工具,可以解析PE结构、加壳和脱壳☆10Apr 16, 2021Updated 5 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Feb 19, 2020Updated 6 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- only for request cve☆18Apr 16, 2025Updated last year
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17May 5, 2021Updated 5 years ago