đŻ Vulnerability Pryer - Prying context into your vulnerability data
â21Feb 24, 2026Updated last week
Alternatives and similar repositories for VulnPryer
Users that are interested in VulnPryer are comparing it to the libraries listed below
Sorting:
- A sample vulnerable driver that emulates kernel mode vulnerabilities.â20Jan 30, 2016Updated 10 years ago
- Some slides from some presentations I have givenâ25Jan 2, 2016Updated 10 years ago
- REST/JSON interface to Burp Suiteâ33Oct 12, 2020Updated 5 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0â18Jan 10, 2012Updated 14 years ago
- My solution to the Higgs Boson Kaggle competition: https://www.kaggle.com/c/higgs-bosonâ10Jan 19, 2018Updated 8 years ago
- Fuzzing web services in style with nodejsâ10Aug 10, 2019Updated 6 years ago
- The educational Animus malwareâ18Sep 25, 2019Updated 6 years ago
- Introduction to Reverse Engineering Trainingâ11Apr 22, 2015Updated 10 years ago
- Auditing & Hardening script for Kubernetesâ45Apr 12, 2018Updated 7 years ago
- implementation of some concepts in Security and Exploitingâ13Aug 24, 2015Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)â11Jan 12, 2018Updated 8 years ago
- Vulnerable Linux socket game for educational purposesâ22Apr 22, 2017Updated 8 years ago
- A collection of private keys that are flawed for research purposes.â12Sep 11, 2020Updated 5 years ago
- Packet Acumenâ19Aug 20, 2014Updated 11 years ago
- This is a prototype and demonstration app to show how to use Github, Github Pages, and the Github API to build applicationsâ14Sep 27, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.â32Jan 4, 2016Updated 10 years ago
- My public presentations and code examplesâ14Jan 20, 2024Updated 2 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windowsâ15Jun 12, 2023Updated 2 years ago
- My configuration files.â18Feb 17, 2026Updated 2 weeks ago
- Concourse CI assets for Compliance Toolkitâ17Sep 12, 2017Updated 8 years ago
- â15Mar 26, 2017Updated 8 years ago
- Kernel assisted microcontainer packerâ24Feb 15, 2019Updated 7 years ago
- Demo of how to create binaries with a colliding MD5â33Feb 27, 2017Updated 9 years ago
- Exploits, Fuzzers, Scripts etcâ35Dec 30, 2025Updated 2 months ago
- PyDBG64 - OS X PyDbg with 64 bits supportâ73Mar 12, 2012Updated 13 years ago
- Dockerised Version of Fridaâ21May 10, 2023Updated 2 years ago
- Scans iPhone/iPad/iPod applications for PIE flagsâ32Mar 4, 2012Updated 14 years ago
- Host files with DNSâ33Mar 1, 2016Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.â16Mar 19, 2025Updated 11 months ago
- Nerve is a cross platform hit tracer built on Ragweedâ47Dec 6, 2011Updated 14 years ago
- A fuzzing library that allows creating malicious payloads based on Joi validator schemas.â14Apr 20, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.â17Mar 17, 2016Updated 9 years ago
- CTF & practice exploit collectionâ38Nov 30, 2016Updated 9 years ago
- â44Aug 9, 2017Updated 8 years ago
- A collection of Volatility Framework plugins.â26Aug 29, 2013Updated 12 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such fâŚâ29Jan 8, 2013Updated 13 years ago
- Materials from presentationâ20Jan 18, 2016Updated 10 years ago
- Tools for attacking cryptographic implementations.â21Oct 27, 2016Updated 9 years ago
- Valgrind extension for whitebox fuzz testingâ30Jul 10, 2009Updated 16 years ago