☆60Oct 25, 2020Updated 5 years ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- Janus: a state-of-the-art file system fuzzer on Linux☆234Dec 23, 2019Updated 6 years ago
- 웹 브라우저 취약점 탐지 자동화 프로젝트☆11Jan 8, 2022Updated 4 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Hydra: an Extensible Fuzzing Framework for Finding Semantic Bugs in File Systems☆173Aug 8, 2022Updated 3 years ago
- 본 프로젝트는 KITRI BoB(Best of the Best) 10기에서 진행한 프로젝트로, 드론에 대한 취약성 연구를 진행한 내용을 기록하였습니다.☆40Jan 5, 2022Updated 4 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆78Sep 15, 2020Updated 5 years ago
- ☆18Jan 21, 2026Updated 2 months ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- I will provide details and pocs for some bugs I found.☆41Apr 15, 2024Updated last year
- A Webkit RCE exploit and an SBX bug☆34Jun 8, 2019Updated 6 years ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Jan 12, 2023Updated 3 years ago
- My Material for the HITB presentation☆35May 31, 2020Updated 5 years ago
- CVE-2019-2525 / CVE-2019-2548☆11Sep 4, 2020Updated 5 years ago
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆162Apr 13, 2019Updated 6 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Materials from Fuzzing Bay Area meetups☆57Dec 23, 2019Updated 6 years ago
- Tracking CVEs for the linux Kernel☆751Apr 9, 2024Updated last year
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- Export disassemblies into Protocol Buffers☆21Jul 18, 2025Updated 8 months ago
- rust ctf writeups(Rust CTF解题报告)☆51Jan 4, 2022Updated 4 years ago
- 大表哥的Syscall-Monitor☆34Jul 18, 2019Updated 6 years ago
- ☆134May 6, 2024Updated last year
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆57Updated this week
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- CVE-2019-0859 1day Exploit☆119Feb 11, 2020Updated 6 years ago
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆43Aug 3, 2021Updated 4 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- 作为博客☆11Apr 30, 2020Updated 5 years ago
- iknowthis Linux SystemCall Fuzzer☆20Apr 18, 2019Updated 6 years ago
- Some presentations I did in the past☆65Apr 17, 2023Updated 2 years ago
- KIISC Digital Forensics Challenge 2021 - DogeCoin's WriteUp☆17Dec 1, 2022Updated 3 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- ☆16Apr 6, 2023Updated 2 years ago
- ☆20Jan 25, 2022Updated 4 years ago