☆11Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jan 21, 2026Updated 2 months ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- This repository contain recurring IoT vulnerabilities found by FirmRec.☆17Aug 25, 2023Updated 2 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this ex…☆10Jul 21, 2020Updated 5 years ago
- Linux x86_64 inject based on inject☆10Sep 26, 2018Updated 7 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- ☆23Jul 3, 2022Updated 3 years ago
- ☆17Feb 3, 2023Updated 3 years ago
- From IoT Pentesting to IoT Security☆23Jan 11, 2019Updated 7 years ago
- ☆69Jun 21, 2024Updated last year
- CVE☆22Aug 26, 2023Updated 2 years ago
- idb2pat script and idb2sig plugin☆16Jan 19, 2022Updated 4 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- Decompose source code into templates and fragments for any language.☆23Aug 29, 2022Updated 3 years ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆77May 12, 2022Updated 3 years ago
- Tutorial on how to use the shell of Zephyr with Teensy 4.0☆13Jan 4, 2021Updated 5 years ago
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 5 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- ☆40Apr 23, 2025Updated 11 months ago
- repo about binary exploitation☆12Dec 5, 2023Updated 2 years ago
- InfoSec Notes☆62Mar 23, 2024Updated 2 years ago
- 用来辅助分析VB程序的IDA插件☆25Dec 28, 2020Updated 5 years ago
- Zyxel password decrypter☆44May 3, 2022Updated 3 years ago
- ☆47May 27, 2023Updated 2 years ago
- ☆12Apr 1, 2020Updated 5 years ago
- build gdb static for all support arch☆25Apr 27, 2022Updated 3 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated 11 months ago
- 一本用代码写出来的Fuzzing书籍:The Fuzzing Book☆13Sep 30, 2023Updated 2 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- Instructions to get Nethunter on a Nexus 6P Using Android 10 (LineageOS).☆22Jan 8, 2021Updated 5 years ago
- GDB Server for interacting with RISC-V models, boards and FPGAs☆20Sep 16, 2019Updated 6 years ago
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆17Sep 25, 2022Updated 3 years ago
- pcileech-fpga with SD card reader card emulation (Realtek RTS522A PCIe Card Reader)☆22Oct 5, 2024Updated last year
- If you need help flashing it or creating it join my discord server https://discord.gg/BckECzDy37☆24Nov 10, 2024Updated last year
- Decrypts multiple BattlEye packets from BEService<>BEDaisy (including those with multiple encryption layers) out to a console.☆28Apr 14, 2022Updated 3 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 10 months ago
- Exp of cve-2019-12272☆20Jul 10, 2019Updated 6 years ago