Got a bogus CVE someone got for a non-vuln? Please share here!
☆25Jul 24, 2024Updated last year
Alternatives and similar repositories for bogus-cves
Users that are interested in bogus-cves are comparing it to the libraries listed below
Sorting:
- ☆28Sep 4, 2024Updated last year
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- Tool for generating non-trivial X.509 certificate chains☆31Feb 28, 2026Updated last week
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Feb 9, 2024Updated 2 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- ☆12Feb 18, 2024Updated 2 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Provides a simple Rest enpoint to create PlantUml images☆10Aug 5, 2016Updated 9 years ago
- On going research project into finding a way to use the iphone 7 without a battery like many other smart phones and laptops can be used.☆13Jun 29, 2024Updated last year
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- This contains the files needed to make the Digikeyboard module for a digispark (in arduino) to work emulating a keyboard in a systems BIO…☆13May 7, 2020Updated 5 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- gRPC Authentication using Google id_tokens☆10Jul 23, 2024Updated last year
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- The repo for the ViruSafe Backend project.☆11Jan 21, 2022Updated 4 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- ☆13Feb 21, 2021Updated 5 years ago
- Explain and validate SQL queries as you type them into Datasette☆12Feb 28, 2024Updated 2 years ago
- Combinator methods for `std::AsyncIterator` using all the new `async` superpowers☆10Feb 15, 2024Updated 2 years ago
- A collection of expired domains previously blocked by Russia's Roskomnadzor, now available for free registration. Reclaim the web! 🌐🔓☆11Feb 27, 2026Updated last week
- Go CD generic poller for Artifactory repositories☆10Nov 11, 2019Updated 6 years ago
- a mechanism to transfer digital credentials securely between two devices☆12Feb 14, 2023Updated 3 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- ☆11Jun 18, 2020Updated 5 years ago
- A MyBB plugin that upgrades the password hash algorithm and converts old passwords on the fly.☆10Nov 17, 2023Updated 2 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- this is a clone of zakos mbcx found at https://gitorious.org/mbcx/mbcx. I'll try to make my own itteration of the mbcx.☆10Apr 23, 2014Updated 11 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Generate Software Bill of Materials (SBOM) from virtual machine disk images, without booting the VM.☆17Feb 20, 2026Updated 2 weeks ago
- ☆17Dec 29, 2012Updated 13 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago