Skip to content
#

cve

Here are 420 public repositories matching this topic...

有关渗透测试的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms

  • Updated Aug 1, 2021
  • PowerShell

Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber

  • Updated Jul 19, 2021
  • C
Molkree
Molkree commented Jul 24, 2021

I propose to add flake8 to the CI. Seems like some already use it (myself included).
Running flake8 . --statistics yields:

5     E265 block comment should start with '# '
6     E266 too many leading '#' for block comment
1     E711 comparison to None should be 'if cond is not None:'
2     E712 comparison to True should be 'if cond is 

Improve this page

Add a description, image, and links to the cve topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the cve topic, visit your repo's landing page and select "manage topics."

Learn more