A project based on Fine-tuned BERT to detect GLIBC vulnerabilities (2023)
☆46Apr 27, 2024Updated last year
Alternatives and similar repositories for PwnBERT
Users that are interested in PwnBERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17May 18, 2022Updated 3 years ago
- Vps_tracker一款攻防演练中快速定位红队资产工具☆22Dec 8, 2023Updated 2 years ago
- 蓝凌OA漏洞利用工具/前台无条件RCE/文件写入☆28Jun 29, 2021Updated 4 years ago
- ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息☆14May 6, 2023Updated 2 years ago
- 数据隐写:将数据嵌入到到 BMP 数据中☆11Oct 28, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Finding security vulnerabilities with CodeQL in C/C++☆14Mar 25, 2021Updated 5 years ago
- Resources required for my BiliBili Pwn tutorial☆12Feb 10, 2023Updated 3 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- 青少年CTF的Python包,方便大家调用一些CTF常用功能。☆39Aug 4, 2025Updated 8 months ago
- Attempts at fuzzing Python unpicklers☆41Mar 24, 2024Updated 2 years ago
- Software Vulnerabilities to Weakness Mapping☆24Feb 24, 2022Updated 4 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- A Hand-drawn style jekyll theme based on PaperCSS.☆14Sep 26, 2023Updated 2 years ago
- 一个帮助你PHP反序列化的python工具☆72Feb 20, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- WriteUps for CTF☆10Nov 13, 2024Updated last year
- 从CTF比赛平台批量下载附件。A tool for downloading attachments in bulk from CTF events on platforms. [计划重新设计 Redesign planned]☆15Mar 13, 2026Updated last month
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- 使用idapython写的一个辅助二进制固件漏洞挖掘的代码审计脚本☆47Aug 3, 2022Updated 3 years ago
- Works about detecting vulnerable using ML.☆87May 2, 2020Updated 5 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 9 months ago
- 《Shiro漏洞研究》☆53Dec 25, 2022Updated 3 years ago
- A Python package written in Rust for email verification without sending any emails.☆17Dec 29, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ChatWithBinary: Advanced AI-powered binary analysis tool leveraging OpenAI & LangChain (2023)☆378Oct 28, 2024Updated last year
- This is a PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆21Jul 21, 2025Updated 8 months ago
- Detecting software vulnerability described public security reports with minimal training examples☆14Jun 11, 2021Updated 4 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆51May 9, 2025Updated 11 months ago
- A simple game engine made with opengl☆13Aug 4, 2022Updated 3 years ago
- ☆16Mar 2, 2025Updated last year
- ☆15Sep 5, 2024Updated last year
- Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.☆36Oct 6, 2025Updated 6 months ago
- ☆15Dec 27, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- minimum ELF64 program to calculate its own SHA256.☆18Aug 22, 2022Updated 3 years ago
- 第四届 “网鼎杯” 网络安全大赛 白虎组 初赛☆16Nov 1, 2024Updated last year
- ☆13Feb 24, 2024Updated 2 years ago
- ☆23Mar 18, 2026Updated last month
- The zero knowledge proof system used in Delta.☆13Mar 17, 2023Updated 3 years ago
- 7bits安全团队-《Java安全-记一次实战使用memoryshell》代码样例☆19Nov 13, 2022Updated 3 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆13Apr 21, 2022Updated 3 years ago