thezdi / cvelistView external linksLinks
☆18Dec 3, 2024Updated last year
Alternatives and similar repositories for cvelist
Users that are interested in cvelist are comparing it to the libraries listed below
Sorting:
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- go-attacker☆10Jun 12, 2019Updated 6 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- ☆17Sep 3, 2018Updated 7 years ago
- 背景: https://weibo.com/5084870733/E6GfkarzQ☆21Jun 17, 2017Updated 8 years ago
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- macOS Class Tree☆21Oct 17, 2017Updated 8 years ago
- pyJoiner Exe Joiner (Windows Version)☆31Jun 9, 2016Updated 9 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Proofs-of-concept☆823Sep 3, 2024Updated last year
- 免杀webshell☆37Jun 21, 2020Updated 5 years ago
- SDL China☆33Nov 8, 2018Updated 7 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ secur…☆32Feb 1, 2026Updated 2 weeks ago
- ☆17Mar 22, 2025Updated 10 months ago
- Deploy scikit-learn models to a REST API using Docker☆10May 1, 2023Updated 2 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- SECCON 2018 Online CTF 27-28 Oct. 2018☆37Nov 4, 2018Updated 7 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- a management tool☆35Dec 8, 2022Updated 3 years ago
- My indi-allsky setups for nightlapses, stargazing, northern light, runnig on Proxmox LXE. Using old Android phones and IP camera's to cap…☆12Oct 6, 2025Updated 4 months ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆11Jan 31, 2019Updated 7 years ago
- Review everyday☆14May 30, 2020Updated 5 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Python Data Audit☆12Jul 24, 2020Updated 5 years ago
- 基于vue2的admin后台管理系统,含有登陆页面(带有滑动验证)、修改密码页面、404页面。封装了axios,将api地址放入环境变量。权限控制生成可访问的路由,并根据路由生成 侧边导航栏。有任何问题可以联系我的邮箱chenzhipeng709@163.com如果喜欢请点个…☆15Jul 26, 2024Updated last year
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- a Burp Extender that add an random X-Forward-For IP address for each request☆31Aug 12, 2016Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Oct 26, 2018Updated 7 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 4 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- MIPS I simulator☆20Dec 28, 2018Updated 7 years ago