Potentially Vulnerable showcases scripts that can be used to locate potentially vulnerable code. See subfolders for more information.
Check out examples of these scripts on YouTube. Ghidra CWE-78, Binary Ninja CWE-78, and Binary Ninja CWE-134.
| Name | Name | Last commit date | ||
|---|---|---|---|---|
Potentially Vulnerable showcases scripts that can be used to locate potentially vulnerable code. See subfolders for more information.
Check out examples of these scripts on YouTube. Ghidra CWE-78, Binary Ninja CWE-78, and Binary Ninja CWE-134.