Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
☆141Aug 12, 2023Updated 2 years ago
Alternatives and similar repositories for mi-x
Users that are interested in mi-x are comparing it to the libraries listed below
Sorting:
- ☆19Dec 28, 2021Updated 4 years ago
- 一些阅读源码和Fuzzing 的经验,涵盖黑盒与白盒测试..☆61Aug 24, 2021Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- Joern Workshops☆31Jan 16, 2025Updated last year
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆66Dec 14, 2021Updated 4 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Jan 12, 2023Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆236Jun 22, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Feb 25, 2026Updated last week
- Some exploits I have written to showcase and to share☆53Mar 24, 2021Updated 4 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆87Oct 2, 2022Updated 3 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- ☆149Jun 5, 2023Updated 2 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Dec 17, 2019Updated 6 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆548Feb 1, 2024Updated 2 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆162Oct 28, 2019Updated 6 years ago
- A gdb for fuzzing☆22Nov 26, 2021Updated 4 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated last year
- ☆19Dec 12, 2023Updated 2 years ago
- Run binaries straight from memory in Linux☆322Apr 17, 2023Updated 2 years ago
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- CVE-2022-34918 netfilter nf_tables 本地提权 POC☆219Sep 15, 2022Updated 3 years ago
- ☆298Jun 21, 2022Updated 3 years ago
- ☆11Apr 18, 2024Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- 域渗透脑图中文翻译版☆12Jan 26, 2022Updated 4 years ago
- Manage collection of SBOMs (Software Bill of Materials)☆14Mar 25, 2024Updated last year
- ☆12Jan 28, 2026Updated last month
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Jan 19, 2023Updated 3 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆473Jul 8, 2024Updated last year
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆166Nov 11, 2021Updated 4 years ago
- A curated list of awesome malware analysis tools and resources☆45Jul 17, 2020Updated 5 years ago
- Corpus of public v8 vulnerability PoCs.☆224Jun 5, 2021Updated 4 years ago
- slides for conference talks☆105Jul 27, 2025Updated 7 months ago
- Collected && Written N day Vulns for study purpose only☆110Dec 16, 2025Updated 2 months ago
- 不依赖llvm源码,独立ollvm☆14Jan 20, 2021Updated 5 years ago