快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/
☆19Sep 9, 2017Updated 8 years ago
Alternatives and similar repositories for VulApps
Users that are interested in VulApps are comparing it to the libraries listed below
Sorting:
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- ☆17Mar 2, 2018Updated 8 years ago
- A terraform plugin for linode☆16Sep 22, 2018Updated 7 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Dec 5, 2016Updated 9 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- A Frida script to bypass SSL pinning in Instagram 157.0 and later (iOS)☆11Sep 20, 2020Updated 5 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Nov 22, 2023Updated 2 years ago
- CVE Exploit PoC's☆34Sep 3, 2023Updated 2 years ago
- scrapped ideas and garbage code☆13May 8, 2021Updated 4 years ago
- 🤗 Transformers: State-of-the-art Machine Learning for Pytorch, TensorFlow, and JAX.☆10Nov 19, 2024Updated last year
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Joplin storage for Read It Later and Bookmarking☆11Feb 7, 2019Updated 7 years ago
- 杀戮尖塔 安卓Mod☆10Aug 4, 2024Updated last year
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Sample Crawler for Data Day Seattle☆10Jun 27, 2015Updated 10 years ago
- black Ip lists, dorks-collection☆16Updated this week
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- 这是一个很普通的安卓导航软件,是我的毕业设计选题《基于Android移动端的导航软件设计》的仓库。☆10Jul 5, 2021Updated 4 years ago
- Virtual service to help secure IoT devices☆12Aug 17, 2017Updated 8 years ago
- declarative flag parsing for Go using struct tags☆12May 7, 2023Updated 2 years ago
- Advanced file format fuzzer based-on deep neural language models.☆41Apr 13, 2023Updated 2 years ago
- High-level library for executable binary file analysis☆16Feb 13, 2017Updated 9 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- ☆20Dec 12, 2025Updated 2 months ago
- stable-diffusion-webui, AI,Beautiful girl☆13Apr 4, 2023Updated 2 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- 基于微信小程序的学生选课管理系统☆11May 17, 2019Updated 6 years ago