HackOvert / LazyBloodhoundLinks
Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter
☆13Updated 4 years ago
Alternatives and similar repositories for LazyBloodhound
Users that are interested in LazyBloodhound are comparing it to the libraries listed below
Sorting:
- ☆38Updated 3 years ago
- ☆22Updated 2 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆139Updated last year
- ☆36Updated 5 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Shielder's public proof of concepts collection☆33Updated 6 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- ☆84Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- Slides from various conference talks☆37Updated 2 years ago
- Report and exploit of CVE-2023-36427☆90Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- A collection of various exploits☆28Updated last year
- Kernel Read Write Execute☆46Updated last year
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Updated 3 years ago
- Linux Kernel module-less implant (backdoor)☆73Updated 4 years ago
- Proof-of-Concept for CVE-2024-26218☆55Updated last year
- ☆33Updated 2 years ago
- Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.☆42Updated this week
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- ☆133Updated 2 weeks ago
- Slides about HyperDbg☆40Updated 6 months ago