Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)
☆13Aug 8, 2023Updated 2 years ago
Alternatives and similar repositories for exploits-predict
Users that are interested in exploits-predict are comparing it to the libraries listed below
Sorting:
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆20Aug 29, 2022Updated 3 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- Tool for Atheros ART partition☆11Oct 9, 2017Updated 8 years ago
- ☆11Dec 6, 2020Updated 5 years ago
- MSDGen: Generater for microservice demos of any given size and connectivity constraints.☆22Nov 26, 2023Updated 2 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- Modelling SQL Injection Using Reinforcement Learning☆20Oct 13, 2021Updated 4 years ago
- ☆14Jul 1, 2019Updated 6 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- Virtual Tagger Plugin is a Cutter plugin that significantly improves handling and analysis of vtables and virtual functions☆16Mar 23, 2023Updated 2 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- secret_sender is a program that manipulates the IP packet to send a message accepted from command line through one of the protocols (TCMP…☆14Jun 3, 2017Updated 8 years ago
- PoC for CVE-2021-1056, related to GPU Container Security☆16Jan 12, 2021Updated 5 years ago
- win32kbase!NtDCompositionCommitSynchronizationObject and win32kbase!NtGdiGetCertificate☆16Oct 14, 2021Updated 4 years ago
- Broadcom Image Editor tool☆20Oct 3, 2019Updated 6 years ago
- 批量检测log4j漏洞,主要还是批量fuzzz 头☆10Dec 11, 2021Updated 4 years ago
- A Command-Line Tool for Efficient Remote Android Device Management. Utilizes DeviceFarmer's API and ADB for streamlined execution of comm…☆25Jan 22, 2025Updated last year
- ☆12Feb 23, 2015Updated 11 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- ☆18Jul 1, 2019Updated 6 years ago
- Microsoft Exchange password spray tool with proxy support.☆39Jul 9, 2021Updated 4 years ago
- A simple VB6 program to test the GMLAN.☆15Aug 17, 2013Updated 12 years ago
- ☆22Jul 1, 2019Updated 6 years ago
- BottlEye is a usermode emulator for the popular anti-cheat BattlEye☆11Jul 7, 2020Updated 5 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Jun 27, 2022Updated 3 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆32Aug 11, 2023Updated 2 years ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- An alternative I2C library for Due with DMA support☆15Nov 24, 2017Updated 8 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- A full-stack Uber Clone Application with Expo’s latest features and lightning-fast edge-ready Postgres database in React Native.☆15Oct 22, 2024Updated last year