jas502n / 0day Security Software Vulnerability Analysis Technology
0day安全_软件漏洞分析技术
Stars: ✭ 393
Projects that are alternatives of or similar to 0day Security Software Vulnerability Analysis Technology
vulnscan
A static binary vulnerability scanner
Stars: ✭ 47 (-88.04%)
Mutual labels: binary, vulnerability
Docker Vulnerability Environment
Use the docker to build a vulnerability environment
Stars: ✭ 370 (-5.85%)
Mutual labels: vulnerability
Fidl
A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 319 (-18.83%)
Mutual labels: vulnerability
Rspirv
Rust implementation of SPIR-V module processing functionalities
Stars: ✭ 332 (-15.52%)
Mutual labels: binary
Tensorflow Windows Wheel
Tensorflow prebuilt binary for Windows
Stars: ✭ 3,428 (+772.26%)
Mutual labels: binary
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-2.8%)
Mutual labels: vulnerability
Grype
A vulnerability scanner for container images and filesystems
Stars: ✭ 362 (-7.89%)
Mutual labels: vulnerability
Awesome Command Line Apps
🐚 Use your terminal shell to do awesome things.
Stars: ✭ 3,572 (+808.91%)
Mutual labels: software
Structurae
Data structures for high-performance JavaScript applications.
Stars: ✭ 323 (-17.81%)
Mutual labels: binary
Binarycodable
Swift Codable-like interfaces for binary representations.
Stars: ✭ 359 (-8.65%)
Mutual labels: binary
Ceras
Universal binary serializer for a wide variety of scenarios https://discord.gg/FGaCX4c
Stars: ✭ 374 (-4.83%)
Mutual labels: binary
Peaclock
A responsive and customizable clock, timer, and stopwatch for the terminal.
Stars: ✭ 314 (-20.1%)
Mutual labels: binary
0day-security-software-vulnerability-analysis-technology
《0day安全:软件漏洞分析技术(第二版)》随书资料包使用注意事项
资料包中资料仅用于学习目的,任何组织、个人、机构不可以任何形式利用资料包中的资料进行商业盈利目的的活动。
资料包中的部分资料和实验代码有可能引起某些安全软件的报警,书籍作者,出版社,看雪论坛对这些使用这些资料造成的后果概不负责,请您在充分了解这些资料用途的基础上慎用。
任何组织、个人、机构不得利用本书及相关资料进行任何形式的非法活动。
[email protected]:/tmp/0day2# git push -u origin master
Username for 'https://github.com': jas502n
Password for 'https://[email protected]':
Counting objects: 1777, done.
Compressing objects: 100% (1702/1702), done.
Writing objects: 100% (1777/1777), 552.35 MiB | 4.50 MiB/s, done.
Total 1777 (delta 698), reused 0 (delta 0)
remote: Resolving deltas: 100% (698/698), done.
remote: warning: GH001: Large files detected. You may want to try Git Large File Storage - https://git-lfs.github.com.
remote: warning: See http://git.io/iEPt8g for more information.
remote: warning: File 19EMail的漏洞挖掘/kerio-kms-6.7.3-7919-win32.exe is 67.39 MB; this is larger than GitHub's recommended maximum file size of 50.00 MB
remote: warning: File 19EMail的漏洞挖掘/turbomail_win_430.exe is 69.93 MB; this is larger than GitHub's recommended maximum file size of 50.00 MB
remote: warning: File 27MS06-055分析实战HeapSpray/VUL_PE/VGX_diff.db is 59.66 MB; this is larger than GitHub's recommended maximum file size of 50.00 MB
To https://github.com/jas502n/0day-security-software-vulnerability-analysis-technology
ede8aa1..dddbe7c master -> master
Branch master set up to track remote branch master from origin.
[email protected]:/tmp/0day2#
百度云盘下载
链接:https://pan.baidu.com/s/1KTkeLqib6jCxvqkH-Fo7NQ 密码:znh8
解压密码:0day2
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].