☆26Aug 16, 2023Updated 2 years ago
Alternatives and similar repositories for Vuln
Users that are interested in Vuln are comparing it to the libraries listed below
Sorting:
- ☆22Jul 3, 2022Updated 3 years ago
- ☆26Apr 13, 2022Updated 3 years ago
- ☆12May 9, 2023Updated 2 years ago
- ☆27Aug 6, 2022Updated 3 years ago
- only for request cve☆18Apr 16, 2025Updated 10 months ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- CVE☆22Aug 26, 2023Updated 2 years ago
- 一个辅助提交 CNVD/CNNVD/CVE 漏洞的工具☆20Jun 20, 2022Updated 3 years ago
- FortiGate automatic repack script☆23Jul 4, 2023Updated 2 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- ☆23May 6, 2024Updated last year
- ☆31Sep 4, 2022Updated 3 years ago
- ☆32Mar 25, 2025Updated 11 months ago
- Shielder's public proof of concepts collection☆33Jul 31, 2025Updated 7 months ago
- ☆33May 19, 2019Updated 6 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- Vulnerability analysis and proof of concepts☆38May 15, 2023Updated 2 years ago
- 一个中文版本的 LibAFL 笔记,主要内容是 LibAFL 原理相关的内容,同时也附加一些 LibAFL 使用方面的 tips ,方便查阅和参考。☆36Nov 22, 2023Updated 2 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- Collection of slides☆33Aug 20, 2025Updated 6 months ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆37Aug 17, 2023Updated 2 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆15Jun 5, 2024Updated last year
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆96Jun 29, 2022Updated 3 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 4 months ago
- ☆15Dec 3, 2020Updated 5 years ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- ☆10Aug 26, 2016Updated 9 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆90May 25, 2017Updated 8 years ago
- ☆32Apr 28, 2022Updated 3 years ago
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)☆10Mar 19, 2020Updated 5 years ago
- ☆20Updated this week
- convert luac to lua source☆11Dec 20, 2024Updated last year
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆14Sep 10, 2024Updated last year