All my public vulnerabilities.
☆14Jan 9, 2021Updated 5 years ago
Alternatives and similar repositories for Public-Vulnerabilities
Users that are interested in Public-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- lowlevel cyber course - riscv & i8086 competition☆11Jan 12, 2019Updated 7 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- A simple kernel written in Rust for studying purposes.☆52May 6, 2018Updated 7 years ago
- A virtualization-based endpoint security solution for Windows☆88May 23, 2021Updated 4 years ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Aug 13, 2020Updated 5 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- 8086 Assembly Chess☆11Feb 11, 2019Updated 7 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 4 years ago
- Create customized callgraph directly from your favorite IDE☆81Feb 13, 2026Updated 2 weeks ago
- ☆11Dec 28, 2019Updated 6 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- A Python Vision Library for object tracking in the 3D physical space☆11Oct 17, 2022Updated 3 years ago
- An automatic tool for fixing dumped PE files☆42Jul 28, 2020Updated 5 years ago
- Rashi Plus Plus - the new Hebrew scripting language☆96May 17, 2021Updated 4 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- Collection of resources about Virtualization☆10Nov 14, 2019Updated 6 years ago
- Create animated meme templates☆11Oct 3, 2023Updated 2 years ago
- Such OS; Very Duck!☆15Feb 19, 2021Updated 5 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Nov 12, 2020Updated 5 years ago
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- Freaking Injector is a tool which made for injecting dlls into other processes in Windows x64 systems with bunch of diffrent injection me…☆11Dec 3, 2020Updated 5 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago
- Abandoned overcomplicated Microkernel using modern x86_64 features☆41Oct 27, 2020Updated 5 years ago
- Porting of (JavaScript version of) corewars8086 from codeguru xtreme to RISC-V cpu☆14Mar 25, 2019Updated 6 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- A kernel rootkit with remote command and control interface for windows☆109Jan 22, 2018Updated 8 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- A script that will send the upcoming CTFs to given discord webhook☆20Jun 4, 2022Updated 3 years ago
- Reverse engineering project on stream☆13Mar 19, 2021Updated 4 years ago
- AWS lambda functions - utilities☆12Jul 8, 2017Updated 8 years ago
- Educational reverse engineering project for https://www.musical.ly/.☆12Apr 8, 2018Updated 7 years ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- ESP AMP☆22Dec 1, 2025Updated 3 months ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆22Apr 15, 2016Updated 9 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago