555 Open source projects that are alternatives of or similar to 0day Security Software Vulnerability Analysis Technology

vulnscan
A static binary vulnerability scanner
Stars: ✭ 47 (-88.04%)
Mutual labels:  binary, vulnerability
Macapps
分享个人收集的Mac的App,持续更新中...
Stars: ✭ 311 (-20.87%)
Mutual labels:  software
Shiro exploit
Apache Shiro 反序列化漏洞检测与利用工具
Stars: ✭ 252 (-35.88%)
Mutual labels:  vulnerability
XSS-Cheatsheet
XSS Cheatsheet - A collection of XSS attack vectors https://xss.devwerks.net/
Stars: ✭ 26 (-93.38%)
Mutual labels:  vulnerability
Neurokit
NeuroKit2: The Python Toolbox for Neurophysiological Signal Processing
Stars: ✭ 264 (-32.82%)
Mutual labels:  software
Fidl
A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 319 (-18.83%)
Mutual labels:  vulnerability
SQL-XSS
A few SQL and XSS attack tools
Stars: ✭ 29 (-92.62%)
Mutual labels:  vulnerability
Rspirv
Rust implementation of SPIR-V module processing functionalities
Stars: ✭ 332 (-15.52%)
Mutual labels:  binary
Gowapt
Go Web Application Penetration Test
Stars: ✭ 300 (-23.66%)
Mutual labels:  vulnerability
xbpch
xarray interface for bpch files
Stars: ✭ 17 (-95.67%)
Mutual labels:  binary
specification
Software Bill of Material (SBOM) standard designed for use in application security contexts and supply chain component analysis
Stars: ✭ 129 (-67.18%)
Mutual labels:  software
Xcframeworks
Demonstration of creating and integrating xcframeworks and their co-op with static libraries and Swift packages
Stars: ✭ 272 (-30.79%)
Mutual labels:  binary
Tensorflow Windows Wheel
Tensorflow prebuilt binary for Windows
Stars: ✭ 3,428 (+772.26%)
Mutual labels:  binary
Nvchecker
New version checker for software releases
Stars: ✭ 256 (-34.86%)
Mutual labels:  software
Iot Vulhub
IoT 固件漏洞复现环境
Stars: ✭ 341 (-13.23%)
Mutual labels:  vulnerability
Blog
个人知识集合整理
Stars: ✭ 34 (-91.35%)
Mutual labels:  software
Api
Vulners Python API wrapper
Stars: ✭ 313 (-20.36%)
Mutual labels:  vulnerability
klustair
(Deprecated) Submit all images in your Kubernetes cluster to Anchore for a vulnerability check and check your configuration with kubeaudit
Stars: ✭ 15 (-96.18%)
Mutual labels:  vulnerability
Docker Vulnerability Environment
Use the docker to build a vulnerability environment
Stars: ✭ 370 (-5.85%)
Mutual labels:  vulnerability
gtfo
Search for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-77.61%)
Mutual labels:  binary
Jaadas
Joint Advanced Defect assEsment for android applications
Stars: ✭ 304 (-22.65%)
Mutual labels:  vulnerability
xsymlink
Xbox One Symbolic Link Exploit: Access restricted/encrypted volumes using the Xbox File Explorer.
Stars: ✭ 18 (-95.42%)
Mutual labels:  vulnerability
Awesome Command Line Apps
🐚 Use your terminal shell to do awesome things.
Stars: ✭ 3,572 (+808.91%)
Mutual labels:  software
Vbscan
OWASP VBScan is a Black Box vBulletin Vulnerability Scanner
Stars: ✭ 295 (-24.94%)
Mutual labels:  vulnerability
hugo-wrapper
The universal way to include Hugo binary to your project.
Stars: ✭ 27 (-93.13%)
Mutual labels:  binary
ezinject
Modular binary injection framework, successor of libhooker
Stars: ✭ 47 (-88.04%)
Mutual labels:  binary
Faraday
Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+713.74%)
Mutual labels:  vulnerability
Structurae
Data structures for high-performance JavaScript applications.
Stars: ✭ 323 (-17.81%)
Mutual labels:  binary
Application Security Engineer Interview Questions
Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
Stars: ✭ 267 (-32.06%)
Mutual labels:  vulnerability
Binarycodable
Swift Codable-like interfaces for binary representations.
Stars: ✭ 359 (-8.65%)
Mutual labels:  binary
B2r2
B2R2 is a collection of useful algorithms, functions, and tools for binary analysis.
Stars: ✭ 262 (-33.33%)
Mutual labels:  binary
E9patch
A powerful static binary rewriting tool
Stars: ✭ 317 (-19.34%)
Mutual labels:  binary
Droid Hunter
(deprecated) Android application vulnerability analysis and Android pentest tool
Stars: ✭ 256 (-34.86%)
Mutual labels:  vulnerability
Ceras
Universal binary serializer for a wide variety of scenarios https://discord.gg/FGaCX4c
Stars: ✭ 374 (-4.83%)
Mutual labels:  binary
ansible-role-ansible
Ansible Role - Ansible
Stars: ✭ 91 (-76.84%)
Mutual labels:  software
Peaclock
A responsive and customizable clock, timer, and stopwatch for the terminal.
Stars: ✭ 314 (-20.1%)
Mutual labels:  binary
redesocial
Projeto do Curso de Sistemas de Informação sobre Rede Social
Stars: ✭ 38 (-90.33%)
Mutual labels:  software
Rbndr
Simple DNS Rebinding Service
Stars: ✭ 343 (-12.72%)
Mutual labels:  vulnerability
plenopticam
Light-field imaging application for plenoptic cameras
Stars: ✭ 111 (-71.76%)
Mutual labels:  software
Android Kernel Exploitation
Android Kernel Exploitation
Stars: ✭ 313 (-20.36%)
Mutual labels:  vulnerability
top-software-engineering-articles
Collection of top articles about great software engineering practices.
Stars: ✭ 45 (-88.55%)
Mutual labels:  software
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-2.8%)
Mutual labels:  vulnerability
mondoo
🕵️‍♀️ Mondoo Cloud-Native Security & Vulnerability Risk Management
Stars: ✭ 60 (-84.73%)
Mutual labels:  vulnerability
Ced
Bose Firmware / Software - ced (AE2, Frames, Noise Cancelling Headphones 700, OE, On-Ear Wireless, QuietComfort 35 II / QC35 / QC35II, QuietControl 30 / QC30, SoundLink Color II, Micro, SL Mini Special Edition, Mini II, Revolve, SoundSport Free, Pulse, Wireless, SoundWear Companion, connect)
Stars: ✭ 313 (-20.36%)
Mutual labels:  software
waithax
An implementation of the waithax / slowhax 3DS Kernel11 exploit.
Stars: ✭ 64 (-83.72%)
Mutual labels:  vulnerability
Gasper
Your Cloud in a Binary
Stars: ✭ 331 (-15.78%)
Mutual labels:  binary
NSE-scripts
NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
Stars: ✭ 105 (-73.28%)
Mutual labels:  vulnerability
Fspickler
A fast multi-format message serializer for .NET
Stars: ✭ 299 (-23.92%)
Mutual labels:  binary
ferryd
Fast, safe and reliable transit for the delivery of software updates to users.
Stars: ✭ 43 (-89.06%)
Mutual labels:  binary
Grype
A vulnerability scanner for container images and filesystems
Stars: ✭ 362 (-7.89%)
Mutual labels:  vulnerability
Exploits
Real world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (-82.44%)
Mutual labels:  vulnerability
Zelos
A comprehensive binary emulation and instrumentation platform.
Stars: ✭ 298 (-24.17%)
Mutual labels:  binary
lightify-binary-protocol
Documentation of the OSRAM Lightify Binary Protocol for communication between Lightify Gateway and applications
Stars: ✭ 26 (-93.38%)
Mutual labels:  binary
Ddisasm
A fast and accurate disassembler
Stars: ✭ 325 (-17.3%)
Mutual labels:  binary
cariboulite
CaribouLite turns any 40-pin Raspberry-Pi into a Tx/Rx 6GHz SDR
Stars: ✭ 785 (+99.75%)
Mutual labels:  software
Pwn2exploit
all mine papers, pwn & exploit
Stars: ✭ 289 (-26.46%)
Mutual labels:  binary
Execa
Process execution for humans
Stars: ✭ 4,318 (+998.73%)
Mutual labels:  binary
Repl
The Learning Hub for UoL's Online CS Students
Stars: ✭ 367 (-6.62%)
Mutual labels:  software
Javadeserh2hc
Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).
Stars: ✭ 361 (-8.14%)
Mutual labels:  vulnerability
Iblessing
iblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (-17.05%)
Mutual labels:  vulnerability
1-60 of 555 similar projects