☆11Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below
Sorting:
- ☆18Jan 21, 2026Updated last month
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- CVE☆22Aug 26, 2023Updated 2 years ago
- This repository contain recurring IoT vulnerabilities found by FirmRec.☆17Aug 25, 2023Updated 2 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- ☆22Jul 3, 2022Updated 3 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- ☆65Jun 21, 2024Updated last year
- ☆40Apr 23, 2025Updated 10 months ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Tools I use on red team engagements and more☆33Mar 14, 2024Updated last year
- ☆33Feb 27, 2024Updated 2 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆78May 12, 2022Updated 3 years ago
- ☆47May 27, 2023Updated 2 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- ☆12Nov 23, 2025Updated 3 months ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆14May 14, 2022Updated 3 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 9 months ago
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 3 years ago
- Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this ex…☆10Jul 21, 2020Updated 5 years ago
- Stereotyped Challenges (2014~2023)☆85Jan 17, 2023Updated 3 years ago
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 4 years ago
- justCTF 2019 challenges sources☆41Jun 9, 2021Updated 4 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 9 months ago
- convert luac to lua source☆11Dec 20, 2024Updated last year
- Multi-instance IDA Pro MCP server — analyze multiple binaries simultaneously through a single MCP endpoint.☆39Updated this week
- Python script to get Samba Server Version☆11May 8, 2018Updated 7 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year