There are 6 repositories under vulnerability-analysis topic.
The Offensive Manual Web Application Penetration Testing Framework.
一个高价值漏洞采集与推送服务 | Collect valueable vulnerabilities and push them to various services
Getting started with java code auditing 代码审计入门的小项目
Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerability reports based on Nmap scan data, and DNS scan information. It can also perform subdomain enumeration to a great extent
Fuzz Introspector -- introspect, extend and optimise fuzzers
A comprehensive binary emulation and instrumentation platform.
Intelligent web vulnerability analysis suite leveraging Generative AI for developers, pentesters, and security researchers.
atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.
IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)
A Tool For Absolute Beginners On Kali Linux. An Interactive Script That'll Guide You Through Attacks.
Program to perform vulnerability analysis and automatically generate a report
TheThing: an open-source tool to detect DOM Clobbering vulnerabilities
본 프로젝트는 KITRI BoB(Best of the Best) 10기에서 진행한 프로젝트로, 드론에 대한 취약성 연구를 진행한 내용을 기록하였습니다.
VulDB Python scripts to fetch data via API
Identifying and Mitigating the CVE-2020–0796 flaw in the fly
RegVuln is a tool that use Engine Trivy to generate reports about images Docker from Registry, have integration with Defect Dojo to Vulnerability Management.
Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, and security tool usage.
RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.
Content for the CERT Guide to Coordinated Vulnerability Disclosure
This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.
Advanced vulnerability management and analysis through data science techniques
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity Community
ReconHound is a Python-based web reconnaissance tool designed for penetration testers, bug bounty hunters, and ethical hackers. It supports directory and file enumeration, subdomain enumeration, fuzzing, and virtual host (vhost) discovery.
Redesign Autonomy is an AI safety evaluation framework for LLM-assisted software engineering. It assesses risks like security flaws, overtrust, and misinterpretation in AI-generated code.
VulDB batch scripts that use curl to fetch data via API
The task was to reverse engineer an open-source software and a custom binary using various diagnostic tools and security assessment techniques.
Performs firmware analysis on a given binary file.
Threat modeling of an open-source VPN Client - OpenConnect using Microsoft Threat Modeling Tool
Hello, this is repository which has solutions for Natas Labs.