Skip to content

Latest commit

 

History

History
5 lines (4 loc) · 499 Bytes

File metadata and controls

5 lines (4 loc) · 499 Bytes

Potentially Vulnerable

Potentially Vulnerable showcases scripts that can be used to locate potentially vulnerable code. See subfolders for more information.

Demos

Check out examples of these scripts on YouTube. Ghidra CWE-78, Binary Ninja CWE-78, and Binary Ninja CWE-134.