Received CVE list
☆12Dec 24, 2021Updated 4 years ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- KAIST Thesis Template☆16Jan 28, 2021Updated 5 years ago
- A Web Platform API proposal for Blob URL☆10Feb 24, 2023Updated 3 years ago
- Overview of Clone Detection Tools for Java☆14Aug 23, 2025Updated 7 months ago
- IoT firmware vulnerability analysis tool based on binary code similarity analysis (BCSA)☆24Jul 6, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software☆18Oct 10, 2023Updated 2 years ago
- Python toolbox for hacking and problem solving☆22Sep 5, 2016Updated 9 years ago
- DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing☆17Feb 27, 2023Updated 3 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆18Jun 21, 2025Updated 9 months ago
- Official implementation of the paper "From Optimization to Generalization: Fair Federated Learning against Quality Shift via Inter-Client…☆12Mar 13, 2025Updated last year
- ☆13Mar 22, 2024Updated 2 years ago
- A small UPnP client☆11Apr 1, 2015Updated 11 years ago
- ☆13Mar 17, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is the our implementation for the paper: Exploring Mixed Information Flow for Cross-domain Sequential Recommendations☆12Aug 17, 2020Updated 5 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆175Dec 15, 2023Updated 2 years ago
- fork old V8 source(tag: 1.2.14.20), make it works for MacOS with CMake, for study purpose☆12Mar 25, 2023Updated 3 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆848Updated this week
- Satori botnet variant☆13Mar 19, 2022Updated 4 years ago
- Markdown Plugin that supports laTex for Textrument☆13Jul 30, 2021Updated 4 years ago
- study launch anywhere and bundle mismatch bug☆17Apr 23, 2023Updated 2 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- ☆15Mar 19, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- some sploits☆19Sep 20, 2024Updated last year
- A curated list of Hardware Hacking resources☆12Apr 14, 2020Updated 6 years ago
- ELF/PE/Mach-O parsing library☆26Oct 10, 2024Updated last year
- ☆15Jan 24, 2021Updated 5 years ago
- Stuff for the DEFCON 24 Car Hacking Village Badge☆13Sep 4, 2016Updated 9 years ago
- DIR-850L A1 Firmware GPL source☆12Mar 9, 2020Updated 6 years ago
- 各种开源CMS 各种版本的漏洞以及EXP 该项目将不断更新☆10Mar 18, 2018Updated 8 years ago
- Test your mini, micro and A-A cables with this little device!☆13Aug 14, 2021Updated 4 years ago
- Examples demonstrating the usage of avatar²☆28Dec 9, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cross-platform CTF problem container manager☆23May 20, 2019Updated 6 years ago
- 一个PE工具,可以解析PE结构、加壳和脱壳☆10Apr 16, 2021Updated 5 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Feb 19, 2020Updated 6 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17May 5, 2021Updated 4 years ago
- Repository for PsychoEvals - a framework for LLM security, psychoanalysis, and moderation.☆18Apr 16, 2023Updated 3 years ago