ElectrovoltSec / HackBenchLinks
How effective are LLMs in identifying and exploiting security vulnerabilities?
☆47Updated 3 months ago
Alternatives and similar repositories for HackBench
Users that are interested in HackBench are comparing it to the libraries listed below
Sorting:
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆44Updated last year
- Awesome MXSS ??☆50Updated 8 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆42Updated this week
- Ansible build for Afl++ Frida-Mode☆23Updated 11 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- ☆23Updated 4 months ago
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Updated last year
- ☆59Updated last month
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆42Updated 4 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆50Updated 11 months ago
- ☆18Updated 2 months ago
- ☆36Updated last month
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆48Updated 10 months ago
- Automated JavaScript Debugging Tool using CDP - Automatically sets breakpoints for specified strings/patterns in JavaScript code☆89Updated 5 months ago
- MobSF Remote code execution (via CVE-2024-21633)☆82Updated last year
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Updated 2 years ago
- POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library☆17Updated 8 months ago
- Slides and other material from various conference presentations.☆44Updated 2 weeks ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆95Updated 8 months ago
- ☆15Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆35Updated last month
- ☆19Updated 2 weeks ago
- V8sandbox_bypass using stack misalignment☆20Updated 9 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 5 months ago
- ☆16Updated 7 months ago
- Security Advisories☆32Updated last month
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆84Updated 5 months ago
- ☆42Updated 4 months ago
- examples of using radius2 to solve reversing challenges☆35Updated 5 months ago