-
Updated
Jun 8, 2021
vulnerabilities
Here are 947 public repositories matching this topic...
Project in the course DD2525 Language-Based Security at KTH Royal Institute of Technology.
-
Updated
Jun 7, 2021 - JavaScript
RuCTF 2023. Developed with ♥ by HackerDom team
-
Updated
Nov 9, 2023 - C++
Contains reusable GitHub Actions workflow to generate container image SBOM using Amazon Inspector SBOM Generator and scan it using Amazon Inspector Scan API.
-
Updated
Aug 19, 2024 - Dockerfile
Collection of proof-of-concept exploits written in Python that target vulnerabilities in Internet Explorer, Adobe Reader and Acrobat, Safari, and Opera.
-
Updated
Nov 12, 2024 - Python
A collection of resources related to vulnerability management.
-
Updated
Aug 8, 2023
Seqra | Security-Focused Static Analyzer
-
Updated
Dec 16, 2025 - Go
Analyzes your Java Maven Project dependencies for security issues and technical debts (CVE/EOL/+).
-
Updated
Feb 9, 2021 - Java
RuCTFE 2018. Developed with ♥ by Hackerdom team
-
Updated
Feb 26, 2022 - Python
-
Updated
Apr 5, 2018 - C++
Ever been rejected on bug bounty? Well send me your reports to give them a second chance. This includes, but is not limited to - XSS, SQL Injection, Code Execution, Deface, Login Bypass and much more.
-
Updated
Jun 8, 2018 - CSS
Repository for COMP.SEC.300 Secure Programming Course
-
Updated
May 20, 2021 - C++
C4T BuT S4D Attack-Defence training
-
Updated
May 11, 2021 - Python
-
Updated
Feb 22, 2024
This project is a Bash-based tool that scans Docker images for vulnerabilities using Trivy and generates a consolidated CSV report.
-
Updated
Apr 20, 2025 - Shell
🎯 List of publicly disclosed application vulnerabilities that I found, reported and were attributed to me.
-
Updated
Oct 1, 2025
U.S. CISA Known Exploited Vulnerabilities (KEV) catalog
-
Updated
Sep 25, 2025 - JavaScript
The approach consists of first extracting the graphical representation of source code, then creating a mixed representation of the three most important representations AST, CFG, and PDG, then benchmarking the performance of every combination with a graphical neural network.
-
Updated
Feb 13, 2023 - Python
Improve this page
Add a description, image, and links to the vulnerabilities topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerabilities topic, visit your repo's landing page and select "manage topics."