A tool to automatically detect copy+pasted and vendored code between repositories
☆76Mar 19, 2026Updated this week
Alternatives and similar repositories for vendetect
Users that are interested in vendetect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆46Updated this week
- Materials for the talk "Python already has a frontend for your compiler" at PiterPy 2023☆21Dec 30, 2023Updated 2 years ago
- some sploits☆19Sep 20, 2024Updated last year
- AppLocker Policy Generator☆26Aug 25, 2025Updated 6 months ago
- Bring runZero Exposure Management into BloodHound☆46Mar 14, 2026Updated last week
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 4 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- CodeHawk C Analyzer: sound static analysis of memory safety (undefined behavior)☆32Feb 26, 2026Updated 3 weeks ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Gopher+ protocol specification☆16Feb 23, 2021Updated 5 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- ☆13Nov 14, 2024Updated last year
- Performant source for RPM repositories metadata https://github.com/gridhead/metasource☆12Feb 16, 2026Updated last month
- Tiny Regular Expression Matcher☆10May 23, 2019Updated 6 years ago
- Dictionary protocol client (RFC 2229) for Emacs☆18Jul 28, 2021Updated 4 years ago
- Robust remote e-mail sending☆23Mar 22, 2023Updated 3 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- A symbolic execution engine for LLVM IR☆52Apr 25, 2022Updated 3 years ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 9 months ago
- WIP transpiler: EVM bytecode -> 🐍 IR -> EVM bytecode☆13Apr 27, 2025Updated 10 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- ☆10Sep 10, 2022Updated 3 years ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 6 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Updated this week
- A framework for linking the DOM and DOM based events with scripting languages compiled to WASM. Part of the PyScript project.☆12Oct 1, 2024Updated last year
- a small script to collect information from a management point☆37Jan 19, 2026Updated 2 months ago
- BigMap integration on AFL++☆15Apr 5, 2021Updated 4 years ago
- Platform for making incremental changes to code in VCSes☆13Jan 10, 2026Updated 2 months ago
- Rez CLI/GUI tool for installing packages from developer package repositories.☆12Nov 25, 2021Updated 4 years ago
- Class notes, quizzes, and exams from a one-semester Introduction to Programming in C class I taught at U Penn☆16Mar 20, 2016Updated 10 years ago
- ☆12Jun 24, 2025Updated 9 months ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- Novel reentrancy attack on Ethereum Smart Contracts using Transient Storage and little gas☆15Nov 10, 2023Updated 2 years ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- John Bradley's classic image viewer (moved to https://gitlab.com/DavidGriffith/xv)☆13Jun 15, 2018Updated 7 years ago