0xdea / semgrep-rulesLinks
A collection of my Semgrep rules to facilitate vulnerability research.
☆765Updated this week
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆714Updated last year
- Fuzz anything with Program Environment Fuzzing☆396Updated 11 months ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆368Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆279Updated this week
- Python Command-Line Ghidra Binary Diffing Engine☆723Updated 3 months ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆546Updated last year
- ☆330Updated last year
- Code Coverage Exploration Plugin for Ghidra☆372Updated last year
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulati…☆290Updated 3 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,275Updated 2 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆438Updated 2 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- EMBArk - The firmware security scanning environment☆367Updated 3 weeks ago
- ☆442Updated last year
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆539Updated 6 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆849Updated 5 years ago
- Coverage-based fuzzer for python applications☆237Updated 3 years ago
- My fuzzing corpus☆310Updated 5 years ago
- The FLARE team's open-source extension to add Python 3 scripting to Ghidra.☆775Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆619Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,302Updated 8 months ago
- A structure-aware HTTP fuzzing library☆217Updated last month
- Repository for information about 0-days exploited in-the-wild.☆845Updated 3 months ago
- A set of vulnerable C code snippets (with mapped CVEs)☆79Updated last year
- EMUX Firmware Emulation Framework (formerly ARMX)☆814Updated 4 months ago
- ☆219Updated 2 weeks ago
- Quarkslab conference talks☆309Updated last month
- Winnie makes fuzzing Windows applications easy☆568Updated 3 years ago
- Use angr in Ghidra☆616Updated last year