Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)
☆13Aug 8, 2023Updated 2 years ago
Alternatives and similar repositories for exploits-predict
Users that are interested in exploits-predict are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆20Aug 29, 2022Updated 3 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- Tool for Atheros ART partition☆11Oct 9, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11Dec 6, 2020Updated 5 years ago
- MSDGen: Generater for microservice demos of any given size and connectivity constraints.☆22Nov 26, 2023Updated 2 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- ☆14Jul 1, 2019Updated 6 years ago
- Modelling SQL Injection Using Reinforcement Learning☆20Oct 13, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- Virtual Tagger Plugin is a Cutter plugin that significantly improves handling and analysis of vtables and virtual functions☆16Mar 23, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- secret_sender is a program that manipulates the IP packet to send a message accepted from command line through one of the protocols (TCMP…☆13Jun 3, 2017Updated 8 years ago
- PoC for CVE-2021-1056, related to GPU Container Security☆16Jan 12, 2021Updated 5 years ago
- win32kbase!NtDCompositionCommitSynchronizationObject and win32kbase!NtGdiGetCertificate☆16Oct 14, 2021Updated 4 years ago
- Broadcom Image Editor tool☆21Oct 3, 2019Updated 6 years ago
- 批量检测log4j漏洞,主要还是批量fuzzz 头☆10Dec 11, 2021Updated 4 years ago
- A Command-Line Tool for Efficient Remote Android Device Management. Utilizes DeviceFarmer's API and ADB for streamlined execution of comm…☆25Jan 22, 2025Updated last year
- ☆12Feb 23, 2015Updated 11 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- ☆18Jul 1, 2019Updated 6 years ago
- Microsoft Exchange password spray tool with proxy support.☆39Jul 9, 2021Updated 4 years ago
- A simple VB6 program to test the GMLAN.☆15Aug 17, 2013Updated 12 years ago
- ☆23Jul 1, 2019Updated 6 years ago
- BottlEye is a usermode emulator for the popular anti-cheat BattlEye☆11Jul 7, 2020Updated 5 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Jun 27, 2022Updated 3 years ago
- Command and Control Framework☆13Mar 23, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆33Aug 11, 2023Updated 2 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 4 years ago
- An alternative I2C library for Due with DMA support☆15Nov 24, 2017Updated 8 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago