BINARLY Research Tools and PoCs
☆40Sep 27, 2024Updated last year
Alternatives and similar repositories for ToolsAndPoCs
Users that are interested in ToolsAndPoCs are comparing it to the libraries listed below
Sorting:
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- ☆42Sep 28, 2024Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Oct 9, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- My WIP bin, various interesting open-source work in progress☆11Aug 2, 2021Updated 4 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- ☆15May 3, 2024Updated last year
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆13Mar 9, 2022Updated 3 years ago
- A guide to silicon reverse engineering by optical microscophy☆14Dec 27, 2024Updated last year
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 10 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 3 weeks ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆16Sep 5, 2024Updated last year
- Binarly Vulnerability Research Advisories☆186Jan 26, 2026Updated last month
- ☆14Jul 29, 2024Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Mar 12, 2024Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Tracking stock volatility.☆15Oct 31, 2021Updated 4 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- ☆19Oct 27, 2024Updated last year
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated last year
- ☆19Nov 28, 2024Updated last year
- A repo for TPM sniffing greatness☆247Feb 20, 2026Updated last week
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- ☆45Mar 5, 2025Updated 11 months ago
- Exploit POC for CVE-2024-36877☆48Aug 14, 2024Updated last year
- ☆20Nov 8, 2020Updated 5 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated 11 months ago
- Erku is an IPTV and video on demand client for the Roku OS.☆12Dec 29, 2024Updated last year