Merge pull request #301 from meitar/rephrase-cwe_checker

Reword the description of cwe_checker for clarity and style conformance.
This commit is contained in:
Samar Dhwoj Acharya 2019-07-10 18:06:40 -05:00 committed by GitHub
commit f826a142b0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -655,7 +655,7 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing).
* [bandit](https://pypi.python.org/pypi/bandit/) - Security oriented static analyser for Python code.
* [cppcheck](http://cppcheck.sourceforge.net/) - Extensible C/C++ static analyzer focused on finding bugs.
* [sobelow](https://github.com/nccgroup/sobelow) - Security-focused static analysis for the Phoenix Framework.
* [cwe_checker](https://github.com/fkie-cad/cwe_checker) - cwe_checker finds vulnerable patterns in binary executables.
* [cwe_checker](https://github.com/fkie-cad/cwe_checker) - Suite of tools built atop the Binary Analysis Platform (BAP) to heuristically detect CWEs in compiled binaries and firmware.
## Vulnerability Databases