Yet Another Vulnerability Database
☆16Jul 23, 2021Updated 4 years ago
Alternatives and similar repositories for yavdb
Users that are interested in yavdb are comparing it to the libraries listed below
Sorting:
- 使用kprobe获取sys_execve参数☆12Nov 22, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- ☆21Nov 30, 2019Updated 6 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- ☆12Apr 21, 2020Updated 5 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 6 years ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- Python Package for burprestapi☆17Dec 27, 2019Updated 6 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Mar 28, 2018Updated 7 years ago
- Example Code Review Exercise☆14Apr 14, 2025Updated 11 months ago
- ☆13Feb 14, 2020Updated 6 years ago
- linux lcx☆11Jul 18, 2016Updated 9 years ago
- ☆17Sep 2, 2021Updated 4 years ago
- ☆12Aug 5, 2015Updated 10 years ago
- JSON-based DSLs are not for humans..☆10Sep 4, 2014Updated 11 years ago
- Wireless Pentest☆18Apr 5, 2018Updated 7 years ago
- Mediador, determine address of proxied request☆11Sep 30, 2021Updated 4 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- An exploration and implementation of the lambda calculus.☆12Oct 18, 2016Updated 9 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated last month
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- My fuzzing workshop from PHDays9☆26May 24, 2019Updated 6 years ago
- Redmine tools using Emacs OrgMode☆13Jul 3, 2012Updated 13 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)☆10Mar 19, 2020Updated 6 years ago
- A Ruby gem that calculates Gematria☆10Mar 15, 2013Updated 13 years ago
- Home page for this github organization☆22Aug 10, 2018Updated 7 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60May 16, 2019Updated 6 years ago
- ☆12Sep 30, 2019Updated 6 years ago
- remove all annoying floating/sticky/popup stuff from medium articles☆12Jun 5, 2019Updated 6 years ago
- An Emacs extension you can sort CSS attributables automatically.☆14Nov 22, 2018Updated 7 years ago
- procps-ng-3.3.10☆11Jul 1, 2015Updated 10 years ago
- An implementation of pstree in rust based on the exercise from TLPI☆15Mar 18, 2016Updated 10 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago