Rezilion / mi-xLinks
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
☆142Updated last year
Alternatives and similar repositories for mi-x
Users that are interested in mi-x are comparing it to the libraries listed below
Sorting:
- ☆208Updated last month
- ☆44Updated 4 years ago
- ☆116Updated 2 years ago
- Cisco ASA Software and ASDM Security Research☆85Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 7 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆88Updated 2 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 4 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- Sandfly Linux Stealth Rootkit Decloaking Utility☆101Updated 2 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- Slides and other material from various conference presentations.☆45Updated 2 months ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆212Updated 3 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 2 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- Find CVE PoCs on GitHub☆148Updated last week
- 🐳 VMs are bloat. Dockerise your VAPT environment☆76Updated 3 months ago
- Link sources to sinks in C# applications.☆145Updated 2 years ago
- ☆95Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 9 months ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Scapy hands-on☆34Updated last year
- Presentations from the CX Security Labs team☆33Updated 2 weeks ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆137Updated 2 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆74Updated 3 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆87Updated 4 months ago
- PoC_CVEs☆162Updated last month