☆183Feb 8, 2026Updated last month
Alternatives and similar repositories for Vulnhalla
Users that are interested in Vulnhalla are comparing it to the libraries listed below
Sorting:
- Slightly better IDA code folding☆14May 26, 2020Updated 5 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- Web Server that serves a single file and keeps the connection open until user releases it.☆74Nov 27, 2013Updated 12 years ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Jun 16, 2024Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆142May 27, 2025Updated 9 months ago
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- ☆56Jan 20, 2026Updated 2 months ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Dec 20, 2024Updated last year
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 8 months ago
- It's the Go compiler, but it panics on arithmetic and truncation issues.☆42Updated this week
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆155Mar 9, 2026Updated last week
- This is practice VM for malware development☆180Nov 17, 2025Updated 4 months ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- This script automates the process of refreshing pseudocode, renaming symbols, and saving the updated IDA database for all functions in a …☆19Feb 27, 2025Updated last year
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- Pishi is a code coverage tool like kcov for macOS.☆76Apr 17, 2025Updated 11 months ago
- ☆75Jul 12, 2025Updated 8 months ago
- ☆33Apr 4, 2022Updated 3 years ago
- hiding in plain sight: part 2☆45Jul 11, 2024Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆89Aug 1, 2025Updated 7 months ago
- BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detectio…☆19Jun 22, 2023Updated 2 years ago
- ☆11May 14, 2024Updated last year
- Postfix SMTP Smuggling - Expect Script POC☆23Dec 26, 2023Updated 2 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Aug 24, 2020Updated 5 years ago
- XMLRPC - RCE in MovableTypePoC☆21Mar 21, 2022Updated 4 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Jun 30, 2023Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- iot-vuls☆24Mar 19, 2024Updated 2 years ago
- A simple Joern MCP Server.☆37Nov 14, 2025Updated 4 months ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- RatChatPT☆16Jun 9, 2023Updated 2 years ago
- Slides of mine.☆12Apr 19, 2024Updated last year
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- Binary Code Summarization☆14Apr 3, 2025Updated 11 months ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆70Nov 13, 2025Updated 4 months ago