Rezilion / mi-x
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
☆140Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mi-x
- ☆192Updated last month
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆240Updated last year
- ☆91Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆86Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆107Updated 7 months ago
- Find CVE PoCs on GitHub☆138Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- ☆59Updated 4 months ago
- ☆104Updated 2 years ago
- Emulate and Dissect MSF and *other* attacks☆139Updated 8 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆69Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆62Updated 7 months ago
- Tool to discover external and internal network attack surface☆192Updated 6 months ago
- Linpmem is a linux memory acquisition tool☆75Updated 6 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- A source code static analysis platform for AppSec enthusiasts.☆204Updated last month
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- Lazarus analysis tools and research report☆55Updated 11 months ago
- ☆115Updated last year
- First iteration of ML based Feedback WAF☆57Updated 8 months ago
- d(ockerp)wn - a docker pwn tool manager☆155Updated 3 years ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆126Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆176Updated 3 months ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆53Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆137Updated last year
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago