All published CVE and their recent changes, ready to be used by humans and machines
-
Updated
May 26, 2024
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
All published CVE and their recent changes, ready to be used by humans and machines
HackerOne "in scope" domains
(MobiSys-24 Poster) BLEGuard: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
syzkaller is an unsupervised coverage-guided kernel fuzzer
OWASP BLT is a bug logging tool to report issues and get points, companies are held accountable.
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
A Terminal UI for browsing security vulnerabilities (CVEs)
Security analysis of a TP Link tl-wr841n router.
WordPress Security Advisories. Add this package to prevent vulnerable WordPress packages from being installed.
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
A static analysis security vulnerability scanner for Ruby on Rails applications
🔐 Security advisories as a simple composer exclusion list, updated daily
PermCheck is a little tool that checks if the files in a PHP project have the executable bit set properly.
Security tools report parsers for Faradaysec.com
Twitch Chat Bot that allows viewers to run arbitrary code on a willing broadcasters machine
This repository contains various malware and ransomware samples for research and analysis purposes.
SSL and TLS protocol test suite and fuzzer
Red Hat Dependency Analytics extension
Vulnogram is a tool for creating and editing CVE information in CVE JSON format