vulnerability-analysis
There are 90 repositories under vulnerability-analysis topic.
0xInfection/TIDoS-Framework
The Offensive Manual Web Application Penetration Testing Framework.
zema1/watchvuln
一个高价值漏洞采集与推送服务 | Collect valueable vulnerabilities and push them to various services
cn-panda/JavaCodeAudit
Getting started with java code auditing 代码审计入门的小项目
morpheuslord/GPT_Vuln-analyzer
Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerability reports based on Nmap scan data, and DNS scan information. It can also perform subdomain enumeration to a great extent
Cryin/Paper
Web Security Technology & Vulnerability Analysis Whitepapers
SkyLined/BugId
Detect, analyze and uniquely identify crashes in Windows applications
ossf/fuzz-introspector
Fuzz Introspector -- introspect, extend and optimise fuzzers
zeropointdynamics/zelos
A comprehensive binary emulation and instrumentation platform.
julieeen/kleefl
Seeding fuzzers with symbolic execution
yz9yt/BugTrace-AI
Intelligent web vulnerability analysis suite leveraging Generative AI for developers, pentesters, and security researchers.
AppThreat/atom
atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.
fkie-cad/iva
IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
ra1nb0rn/avain
A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
VainlyStrain/Vaile
Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)
hestihesti/HackingComm
A Tool For Absolute Beginners On Kali Linux. An Interactive Script That'll Guide You Through Attacks.
simplevulnerabilitymanager/svm
Program to perform vulnerability analysis and automatically generate a report
SoheilKhodayari/TheThing
TheThing: an open-source tool to detect DOM Clobbering vulnerabilities
BOB4Drone/Drone_Hacking_Guideline
본 프로젝트는 KITRI BoB(Best of the Best) 10기에서 진행한 프로젝트로, 드론에 대한 취약성 연구를 진행한 내용을 기록하였습니다.
vuldb/vuldb-api-python-examples
VulDB Python scripts to fetch data via API
ButrintKomoni/cve-2020-0796
Identifying and Mitigating the CVE-2020–0796 flaw in the fly
drjerry/cve-score
ML research on software vulnerabilities
cristianovisk/regvuln
RegVuln is a tool that use Engine Trivy to generate reports about images Docker from Registry, have integration with Defect Dojo to Vulnerability Management.
aniket2912/All-CEHv13-Module-wise-PDF-Reports
Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, and security tool usage.
proxytype/RDP-THIEF
RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.
CERTCC/CERT-Guide-to-CVD
Content for the CERT Guide to Coordinated Vulnerability Disclosure
BOB4Drone/Drone_Hacking_Guideline_ENG
This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.
TypeError/vuln-data-science
Advanced vulnerability management and analysis through data science techniques
paulveillard/cybersecurity-community
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity Community
s-r-e-e-r-a-j/ReconHound
ReconHound is a Python-based web reconnaissance tool designed for penetration testers, bug bounty hunters, and ethical hackers. It supports directory and file enumeration, subdomain enumeration, fuzzing, and virtual host (vhost) discovery.
Satyamkumarnavneet/RedesignAutonomy
Redesign Autonomy is an AI safety evaluation framework for LLM-assisted software engineering. It assesses risks like security flaws, overtrust, and misinterpretation in AI-generated code.
vuldb/vuldb-api-win-batch-curl-examples
VulDB batch scripts that use curl to fetch data via API
arvindpj007/Reverse-Engineering-CISCO-OpenConnect
The task was to reverse engineer an open-source software and a custom binary using various diagnostic tools and security assessment techniques.
ericyoc/iot_device_firmware_analysis_poc
Performs firmware analysis on a given binary file.
arvindpj007/Threat-Modeling-CISCO-OpenConnect
Threat modeling of an open-source VPN Client - OpenConnect using Microsoft Threat Modeling Tool
Dr4ks/Natas_Labs_Solution
Hello, this is repository which has solutions for Natas Labs.
vulnlog/vulnlog
Software Vulnerability Tracking for Development Teams