CVE database store
☆131Oct 19, 2020Updated 5 years ago
Alternatives and similar repositories for victims-cve-db
Users that are interested in victims-cve-db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Identify vulnerable libraries in Maven dependencies☆46Dec 14, 2022Updated 3 years ago
- Burp Scanner XML Parser☆36Sep 24, 2014Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Yet Another Vulnerability Database☆16Jul 23, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Host files with DNS☆32Mar 1, 2016Updated 10 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆194Mar 10, 2019Updated 7 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Feb 24, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Automate security tests using Burp Suite.☆233Jun 12, 2024Updated last year
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24May 10, 2025Updated 10 months ago
- A proxy for encrypting TCP connections.☆11Mar 15, 2017Updated 9 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Jul 24, 2019Updated 6 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Java Deserialization☆27Oct 21, 2016Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- ☆231Feb 13, 2019Updated 7 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆44May 4, 2022Updated 3 years ago
- Published security vulnerabilities, research, and associated information.☆138Dec 9, 2019Updated 6 years ago
- 使用kprobe获取sys_execve参数☆12Nov 22, 2018Updated 7 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆22Dec 31, 2018Updated 7 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Sep 4, 2014Updated 11 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- Bugscan Web Vulnerability Scaner Online System☆68Apr 4, 2016Updated 9 years ago
- "What if I tossed small pox into a room filled with sprinters after filling their water cups with red bull."☆33Feb 9, 2026Updated last month
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago