Rezilion / mi-xLinks
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
β141Updated last year
Alternatives and similar repositories for mi-x
Users that are interested in mi-x are comparing it to the libraries listed below
Sorting:
- Command line fuzzer and bruteforcer πͺ wfuzz for commandβ86Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.β248Updated 2 years ago
- Find CVE PoCs on GitHubβ148Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, anβ¦β143Updated 2 years ago
- Lazarus analysis tools and research reportβ56Updated last year
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stagβ¦β88Updated last year
- PoC and Detection for CVE-2024-21626β75Updated last year
- β200Updated 3 weeks ago
- β94Updated 3 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.β66Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talksβ65Updated 2 years ago
- Cisco ASA Software and ASDM Security Researchβ85Updated 2 years ago
- β47Updated 2 years ago
- β115Updated last year
- A collection of projects demonstrating various commandline cloaking techniques on Linuxβ58Updated 2 years ago
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β133Updated 2 months ago
- Blogpost series showcasing interesting cloud - web app security bugsβ49Updated last year
- A curated list of argument injection vectorsβ41Updated 4 months ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that arβ¦β68Updated 3 years ago
- Static Token And Credential Scannerβ96Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.β182Updated 2 months ago
- PoC_CVEsβ163Updated 2 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.β62Updated 6 months ago
- Source Code Management Attack Toolkitβ219Updated 2 years ago
- A repository of previous info-sec presentations I've presented.β161Updated 7 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guideβ41Updated 5 months ago
- Manager of third-party sources of Semgrep rules πβ86Updated 10 months ago
- Collected && Written N day Vulns for study purpose onlyβ105Updated 3 weeks ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and otheβ¦β177Updated 2 years ago
- β62Updated 11 months ago