A technique for developing Fortify structural rules and characterization rules.
☆14Dec 2, 2019Updated 6 years ago
Alternatives and similar repositories for fortify-structural-rules-guide
Users that are interested in fortify-structural-rules-guide are comparing it to the libraries listed below
Sorting:
- some codeql rules☆15Apr 6, 2020Updated 5 years ago
- Python library for Fortify Software Security Center (SSC) RESTFul API☆21Apr 14, 2025Updated 10 months ago
- Java library used to upload files following the security steps described by OWASP☆10Jun 7, 2021Updated 4 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- Repository for ASE 2017 paper, "Modular Verification of Interrupt-driven Software".☆11May 20, 2019Updated 6 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- 团队更名为 QAX A-TEAM☆10Apr 28, 2019Updated 6 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- A tool to detect who's cutting the internet on your network☆13Apr 30, 2020Updated 5 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- An implementation of sparse-value flow analysis on top of soot (using Scala)☆10Dec 12, 2024Updated last year
- A blog of Programming Languages Group @Purdue☆11Feb 17, 2026Updated 2 weeks ago
- ☆12Dec 16, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- Ranking LLM-Generated Loop Invariants for Program Verification.☆12Aug 20, 2024Updated last year
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- ☆10Dec 10, 2025Updated 2 months ago
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- https://hackmd.io/s/r1SgsdF3X☆10Dec 21, 2018Updated 7 years ago
- ☆11Mar 19, 2022Updated 3 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- DAI: Demanded Abstract Interpretation☆16Sep 23, 2024Updated last year
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- My Fortify Docker Scripts☆12Mar 12, 2025Updated 11 months ago
- Anyswap aka Multichain V4Router 攻击事件的分析和复现☆11Feb 15, 2022Updated 4 years ago
- VisualDFA is a sophisticated educational tool for interactively visualizing data-flow analyses using Java/Jimple.☆12Sep 14, 2017Updated 8 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- Meta-specification framework for AI Agents to generate Spec-driven X toolkits automatically.☆28Nov 22, 2025Updated 3 months ago
- Python library for communicating with the Aspose.PDF Cloud API☆12Feb 6, 2026Updated 3 weeks ago
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago