badd1e / DisclosuresLinks
Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts
☆424Updated 3 years ago
Alternatives and similar repositories for Disclosures
Users that are interested in Disclosures are comparing it to the libraries listed below
Sorting:
- Vulnerability examples.☆412Updated last year
- Exploiting challenges in Linux and Windows☆120Updated 6 years ago
- collection of verified Linux kernel exploits☆190Updated 5 years ago
- How to build an efficient pwn development environment in 2020☆269Updated 4 years ago
- A Binary Ninja plugin for vulnerability research.☆298Updated last year
- Slide decks from my conference presentations☆367Updated 2 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆229Updated 6 years ago
- Exploit Development, Reverse Engineering & Cryptography☆255Updated 4 months ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆850Updated 5 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆335Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆824Updated 4 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- SSD Secure Disclosure Advisories☆170Updated 5 years ago
- My Chrome and Safari exploit code + write-up repo☆531Updated 4 years ago
- Dump of win32k POCs for bugs I've found☆382Updated 3 years ago
- VerSprite Security Research☆170Updated 2 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆519Updated 7 months ago
- A collection of links related to VMware escape exploits☆1,480Updated last year
- An archive of low-level CTF challenges developed over the years☆652Updated 4 years ago
- Linux Heap Exploitation Practice☆395Updated 7 years ago
- Public work for CVE-2019-0708☆291Updated 6 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- collect for learning cases☆595Updated last year
- Exploitation and Mitigation Slides☆134Updated last year
- ☆385Updated last year
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆747Updated 2 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆207Updated 3 years ago