vin01 / bogus-cves
Got a bogus CVE someone got for a non-vuln? Please share here!
☆24Updated 6 months ago
Alternatives and similar repositories for bogus-cves:
Users that are interested in bogus-cves are comparing it to the libraries listed below
- Source code of https://whatsrc.org/☆34Updated 2 weeks ago
- Linux kernel source tree with OpenPaX patch☆83Updated 3 months ago
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆60Updated 10 months ago
- Simple syscall sandboxing for Linux☆130Updated this week
- A cache hard password hash/KDF☆47Updated 11 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- Systemd Hardening Helper - Mirror of https://github.com/desbma/shh☆114Updated this week
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆33Updated this week
- ☆17Updated last year
- Bertie TLS 1.3 Implementation☆118Updated last week
- A high level language for SELinux policy☆57Updated this week
- OpenBSD APIs ported to Linux userspace using SECCOMP BPF and Landlock LSM☆109Updated last year
- 🧹🧹🧹 File expiration for any filesystem☆46Updated last year
- ☆45Updated last year
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated 2 weeks ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆34Updated 2 months ago
- Library and binaries for the reading, creating, and modification of SquashFS file systems☆125Updated this week
- ☆36Updated 3 weeks ago
- Minimal setup to trigger the xz backdoor☆25Updated 4 months ago
- A collection of high-performance crypto implementations.☆46Updated 3 weeks ago
- A tool to help you understand TPM commands and responses.☆37Updated 2 months ago
- An implementation of HOTP Indexed DNS☆16Updated last year
- PKI support for SSH certificates☆57Updated 3 years ago
- usand - convenient and minimal unshare(1)-based sandbox☆62Updated 4 years ago
- Build postprocessor to reset metadata fields for build reproducibility☆56Updated last week
- A suite of testvectors for X.509 certificate path validation and tools for building them☆46Updated this week
- A library for intercepting system calls☆68Updated last month
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 8 months ago
- Repology rewrite in Rust☆29Updated 3 weeks ago
- A practical experiment on supply-chain security using reproducible builds☆153Updated last year