A project based on Fine-tuned BERT to detect GLIBC vulnerabilities (2023)
☆46Apr 27, 2024Updated last year
Alternatives and similar repositories for PwnBERT
Users that are interested in PwnBERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Zulip-based bot to respond users by ChatGPT☆18Feb 1, 2026Updated last month
- subdomain_dict☆16Jun 30, 2020Updated 5 years ago
- FPGA Innovation Design Competition:RISC-V Processor-based Hardware and Software Design in PGL22G☆12Sep 1, 2023Updated 2 years ago
- ☆30Sep 19, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Vps_tracker一款攻防演练中快速定位红队资产工具☆22Dec 8, 2023Updated 2 years ago
- 蓝凌OA漏洞利用工具/前台无条件RCE/文件写入☆28Jun 29, 2021Updated 4 years ago
- 数据隐写:将数据嵌入到到 BMP 数据中☆11Oct 28, 2020Updated 5 years ago
- Finding security vulnerabilities with CodeQL in C/C++☆14Mar 25, 2021Updated 5 years ago
- Resources required for my BiliBili Pwn tutorial☆12Feb 10, 2023Updated 3 years ago
- 使用Docker一键制作vol3取证需要的的SymbolTables☆12Aug 31, 2025Updated 6 months ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- 青少年CTF的Python包,方便大家调用一些CTF常用功能。☆39Aug 4, 2025Updated 7 months ago
- Attempts at fuzzing Python unpicklers☆41Mar 24, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Software Vulnerabilities to Weakness Mapping☆23Feb 24, 2022Updated 4 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- A Hand-drawn style jekyll theme based on PaperCSS.☆14Sep 26, 2023Updated 2 years ago
- 图片马免杀☆39Jan 24, 2023Updated 3 years ago
- 一个帮助你PHP反序列化的python工具☆72Feb 20, 2026Updated last month
- Hardware Accelerated MWPM decoder for Quantum Error Correction☆19Mar 23, 2025Updated last year
- WriteUps for CTF☆10Nov 13, 2024Updated last year
- 从CTF比赛平台批量下载附件。A tool for downloading attachments in bulk from CTF events on platforms. [计划重新设计 Redesign planned]☆15Mar 13, 2026Updated 2 weeks ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 使用idapython写的一个辅助二进制固件漏洞挖掘的代码审计脚本☆47Aug 3, 2022Updated 3 years ago
- 《C++反汇编与逆向分析技术揭秘》学习笔记☆12Jun 10, 2018Updated 7 years ago
- Works about detecting vulnerable using ML.☆87May 2, 2020Updated 5 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.☆37Oct 6, 2025Updated 5 months ago
- 《Shiro漏洞研究》☆53Dec 25, 2022Updated 3 years ago
- PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882