☆26Sep 2, 2025Updated 6 months ago
Alternatives and similar repositories for Vulnerability-Research
Users that are interested in Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Sep 26, 2019Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- ☆12Jul 25, 2019Updated 6 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆21May 9, 2019Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- ☆17Jun 17, 2022Updated 3 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- ☆16Oct 12, 2018Updated 7 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 7 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- Firmware for the Zyxel VMG3925-B10B☆22Feb 12, 2020Updated 6 years ago
- An0n 3xPloiTeR Shell☆35Oct 4, 2019Updated 6 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆41Oct 13, 2022Updated 3 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- I created the python script to bypass UAC to get system shell .☆121Sep 2, 2019Updated 6 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- 一个Burpsuite插件,用于检测隐藏的XSS☆40Mar 31, 2019Updated 6 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆29Nov 14, 2018Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Parse a raw HTTP request and generate request code in different languages☆34Jun 14, 2020Updated 5 years ago
- finds hidden parameters☆23Aug 12, 2023Updated 2 years ago