How effective are LLMs in identifying and exploiting security vulnerabilities?
☆68Feb 28, 2025Updated last year
Alternatives and similar repositories for HackBench
Users that are interested in HackBench are comparing it to the libraries listed below
Sorting:
- experimental wildcard subdomain filtering prototype☆14Aug 5, 2023Updated 2 years ago
- Android Telephony, RIL, Radio of Modem module☆25Mar 1, 2022Updated 4 years ago
- Workshop for Model Context Protocol☆17Mar 27, 2025Updated 11 months ago
- TheHulk is a dynamic analysis tool designed to detect and exploit DOM Clobbering vulnerabilities.☆91Aug 25, 2025Updated 6 months ago
- IDA plugin to recover source code from panic information on rust☆18May 9, 2025Updated 10 months ago
- Easily search LLVM headers for all major versions!☆19Sep 14, 2025Updated 6 months ago
- Claude Code plugin providing skills for x64dbg debugger automation☆78Mar 13, 2026Updated last week
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆98Nov 27, 2023Updated 2 years ago
- XBOW Validation Benchmarks☆523Jun 18, 2025Updated 9 months ago
- Pure-Python HashLink bytecode Swiss Army knife.☆22Nov 11, 2025Updated 4 months ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- ☆31Feb 28, 2025Updated last year
- a cute hook framwork(now for arm64)☆30Nov 28, 2017Updated 8 years ago
- ☆20Oct 14, 2024Updated last year
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆78Apr 18, 2025Updated 11 months ago
- Payload encoding utility to effectively lower payload entropy.☆125Apr 15, 2025Updated 11 months ago
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆57Oct 25, 2023Updated 2 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Writing MACI circuits in Noir☆16Oct 8, 2023Updated 2 years ago
- A collection of LLVM passes for obfuscating☆42Mar 9, 2023Updated 3 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- RE for champions☆15Mar 10, 2026Updated last week
- My write ups - Capture the flag challanges☆19Nov 18, 2022Updated 3 years ago
- An optimizing decompiler (modified to use remill semantics)☆30Jan 4, 2019Updated 7 years ago
- Client-Side Prototype Pollution Tools☆86Sep 21, 2021Updated 4 years ago
- ☆37Oct 2, 2024Updated last year
- YuraScanner☆73Feb 13, 2025Updated last year
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- Symbolic execution of LLVM IR traces for program understanding.☆27Feb 24, 2014Updated 12 years ago
- llvm powered deobfuscation of a vm-based protection☆53Feb 25, 2026Updated 3 weeks ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- some leaked src code for known and unknown malwares☆23Aug 15, 2025Updated 7 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆69Mar 8, 2026Updated last week
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆172Feb 23, 2026Updated 3 weeks ago
- Easy-to-use Android library for tampering detection, with a sample app included☆62Mar 20, 2025Updated last year
- Awesome MXSS ??☆56Sep 30, 2024Updated last year
- Challenge infrastructure used for the DownUnderCTF competition☆25Sep 8, 2025Updated 6 months ago
- little scripts of bash stuff that i've found handy.☆16Feb 2, 2019Updated 7 years ago