Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)
☆10Feb 7, 2017Updated 9 years ago
Alternatives and similar repositories for BVED
Users that are interested in BVED are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Jun 2, 2020Updated 5 years ago
- Prebuilt versions of V8 using GitHub Actions☆16Dec 14, 2019Updated 6 years ago
- 我在学习浏览器安全过程中整理的漏洞分析笔记与相关的学习资料☆68Oct 29, 2018Updated 7 years ago
- 暴力检测一些qq企业邮箱弱口令的用户。以提醒他们修改密码☆13Nov 25, 2015Updated 10 years ago
- 常用的一些Exploit,经常会更新,也欢迎各位提交新的exp给我。☆26Jul 27, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆12Jul 1, 2018Updated 7 years ago
- simple and clean ip look up with bootstrap template☆131Sep 30, 2020Updated 5 years ago
- A curated list of awesome resources for tracking vulnerabilities in software☆18May 4, 2017Updated 8 years ago
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- Summary of binary vulnerability mining techniques☆34Jan 6, 2020Updated 6 years ago
- browser_vuln_check ,利用已知的浏览器漏洞PoC 来快速检测Webview 和浏览器环境是否存在安全漏洞,只需要访问run.html 即可获取所有扫描结果,适用场景包含:APP 发布之前的内部安全测试,第三方Webview 漏洞检测等(browser_vu…☆118Aug 16, 2017Updated 8 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- 这里存放的是我们团队做CTF题目的时候经常用到的一些工具☆11Nov 5, 2018Updated 7 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆20Feb 27, 2022Updated 4 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Feb 13, 2023Updated 3 years ago
- afl源码分析☆13Aug 9, 2018Updated 7 years ago
- 让ELF以特定libc链接运行,带符号版本☆14Mar 10, 2020Updated 6 years ago
- 分布式的sqlmapapi☆11Sep 9, 2016Updated 9 years ago
- ☆14Jul 27, 2020Updated 5 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- a better basefinder☆12Aug 25, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- calico-kubernetes☆14Feb 2, 2016Updated 10 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)☆22Aug 31, 2018Updated 7 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Implementation of differential fuzz testing for TLS handshake messages☆12Jul 2, 2021Updated 4 years ago
- C++ wrapers to simplify working with the JsRT interface to the Chakra JavaScript engine.☆16Nov 16, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- url crawler☆12Oct 9, 2020Updated 5 years ago
- A mildly competent autogenerated telegram api wrapper☆10Mar 2, 2026Updated 3 weeks ago
- Serial Whitelist Application Trainer☆31Jul 7, 2019Updated 6 years ago
- hash dump tool☆26May 10, 2016Updated 9 years ago
- A simple provider to analyse what gets passed into Microsoft's Anti-Malware Scan Interface☆17Jan 10, 2020Updated 6 years ago
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago
- Rusty Mimikatz - All credits to: github.com/ThottySploity/mimiRust (Original author deleted account so I uploaded for community use)☆21Nov 24, 2022Updated 3 years ago