Stars
- All languages
- ANTLR
- ASP
- Assembly
- Batchfile
- BlitzBasic
- Boo
- Bro
- C
- C#
- C++
- CSS
- Classic ASP
- Clojure
- CodeQL
- CoffeeScript
- Crystal
- Dart
- Dockerfile
- Erlang
- F#
- Fluent
- GLSL
- Go
- Groovy
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Logos
- Lua
- MATLAB
- Makefile
- Markdown
- OCaml
- Objective-C
- Objective-C++
- PHP
- POV-Ray SDL
- Pascal
- Perl
- PowerShell
- Prolog
- Propeller Spin
- Pug
- Python
- Raku
- Rebol
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Smarty
- Solidity
- SourcePawn
- Swift
- SystemVerilog
- TSQL
- TeX
- TypeScript
- VBA
- Visual Basic
- Vue
- WebAssembly
- XSLT
- YARA
- Zeek
- reStructuredText
14
stars
written in Dockerfile
Clear filter
Pre-Built Vulnerable Environments Based on Docker-Compose
Hangover runs Win64 and Win32 applications on arm64 Linux
PoC for CVE-2018-15133 (Laravel unserialize vulnerability)
A portable reverse engineering environment using docker.
Environment for CVE-2019-6340 (Drupal)
Proof of concept showing how to exploit the CVE-2018-11759
CVE-2018-16509 (Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities)