Proof of Concepts (PE, PDF...)
☆1,537Dec 22, 2024Updated last year
Alternatives and similar repositories for pocs
Users that are interested in pocs are comparing it to the libraries listed below
Sorting:
- documentations, slides decks...☆826May 4, 2024Updated last year
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,953Feb 24, 2025Updated last year
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,273Nov 6, 2025Updated 3 months ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,379Aug 8, 2024Updated last year
- A fork of AFL for fuzzing Windows binaries☆2,535Dec 5, 2025Updated 3 months ago
- File formats dissections and more...☆11,412Feb 18, 2024Updated 2 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- Hash collisions and exploitations☆3,342Feb 20, 2025Updated last year
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆743Mar 17, 2019Updated 6 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,868Updated this week
- A Coverage Explorer for Reverse Engineers☆2,505Feb 14, 2026Updated 2 weeks ago
- Diaphora, the most advanced Free and Open Source program diffing tool.☆4,191Nov 24, 2024Updated last year
- Collaborative Reverse Engineering plugin for IDA Pro & Hex-Rays☆666Feb 17, 2021Updated 5 years ago
- A static analyzer for PE executables.☆1,107Updated this week
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,762Apr 3, 2024Updated last year
- Demos of various injection techniques found in malware☆796Feb 15, 2022Updated 4 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,316Sep 3, 2019Updated 6 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆634Jul 7, 2017Updated 8 years ago
- A collection of links related to VMware escape exploits☆1,494Sep 4, 2024Updated last year
- A repository for learning various heap exploitation techniques.☆8,450Jan 15, 2026Updated last month
- Automated static analysis tools for binary programs☆1,675Dec 18, 2025Updated 2 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,562Oct 31, 2025Updated 4 months ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,615Jun 11, 2025Updated 8 months ago
- A collection of links related to Linux kernel security and exploitation☆6,353Jan 26, 2026Updated last month
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,070Dec 2, 2025Updated 3 months ago
- VMAttack PlugIn for IDA Pro☆866Nov 30, 2017Updated 8 years ago
- WinDBG Anti-RootKit Extension☆645Jul 29, 2020Updated 5 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- My proof-of-concept exploits for the Linux kernel☆1,563Sep 11, 2025Updated 5 months ago
- Hex-Rays Decompiler plugin for better code navigation☆2,607Nov 27, 2025Updated 3 months ago
- A powerful and user-friendly binary analysis platform!☆8,517Updated this week
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,114Sep 14, 2025Updated 5 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,909Feb 23, 2026Updated last week
- A collection of resources for linux reverse engineering☆2,074Jun 2, 2022Updated 3 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- Reverse engineering framework in Python☆3,828Jan 26, 2025Updated last year
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,310Jan 6, 2026Updated last month
- A memory scanning evasion technique☆899May 24, 2017Updated 8 years ago