0xdea / semgrep-rulesLinks
A collection of my Semgrep rules to facilitate vulnerability research.
☆712Updated this week
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆709Updated last year
- Fuzz anything with Program Environment Fuzzing☆391Updated 9 months ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆366Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆278Updated this week
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆438Updated last month
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆540Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆713Updated last month
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,263Updated last month
- ☆328Updated last year
- ☆441Updated last year
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulati…☆290Updated 3 years ago
- My fuzzing corpus☆306Updated 5 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆166Updated last year
- Coverage-based fuzzer for python applications☆237Updated 3 years ago
- the Network Protocol Fuzzer that we will want to use.☆782Updated last year
- A set of vulnerable C code snippets (with mapped CVEs)☆78Updated last year
- EMUX Firmware Emulation Framework (formerly ARMX)☆785Updated 2 months ago
- Code Coverage Exploration Plugin for Ghidra☆368Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,285Updated 7 months ago
- EMBArk - The firmware security scanning environment☆366Updated 3 weeks ago
- Repository for information about 0-days exploited in-the-wild.☆837Updated 2 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆844Updated 5 years ago
- Use angr in Ghidra☆610Updated last year
- Source code for the DEF CON 30 CTF Qualifiers.☆266Updated last year
- A structure-aware HTTP fuzzing library☆217Updated 11 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated last week
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆533Updated 5 months ago
- Quarkslab conference talks☆308Updated last week
- ☆173Updated 3 years ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆621Updated 11 months ago