Rezilion / mi-xLinks
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
☆141Updated 2 years ago
Alternatives and similar repositories for mi-x
Users that are interested in mi-x are comparing it to the libraries listed below
Sorting:
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- Cisco ASA Software and ASDM Security Research☆86Updated 3 years ago
- ☆212Updated last week
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- ☆116Updated 2 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆106Updated 2 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated 11 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated last month
- ☆44Updated 4 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆50Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆73Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆162Updated last year
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 3 years ago
- IoT and Operational Technology Honeypot☆104Updated 2 years ago
- ☆95Updated 4 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆69Updated last year
- Find CVE PoCs on GitHub☆156Updated 3 months ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆189Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- PoC_CVEs☆166Updated last week