Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide
☆43Dec 16, 2024Updated last year
Alternatives and similar repositories for Unsafe-Unpacking
Users that are interested in Unsafe-Unpacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 11 months ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- 🔗 A curated list of awesome Caido related projects☆46Mar 25, 2025Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆51Dec 31, 2024Updated last year
- ☆25Jul 19, 2024Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Apr 17, 2018Updated 7 years ago
- ☆22Dec 1, 2025Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 11 months ago
- The rev.ng demos☆13Mar 11, 2026Updated 2 weeks ago
- ☆93Apr 29, 2024Updated last year
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- AWS STS token decoder☆47Mar 18, 2025Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- 反取证程序,类似usbkill☆11Apr 22, 2023Updated 2 years ago
- ☆36Jan 27, 2025Updated last year
- .NET deserialization hunter☆89Jul 21, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Semgrep queries developed by Trail of Bits.☆486Nov 12, 2025Updated 4 months ago
- ☆34Jul 4, 2023Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 5 months ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- burp解密插件☆10Jun 9, 2023Updated 2 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆43Dec 3, 2025Updated 3 months ago
- ☆80Nov 7, 2024Updated last year
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆112Jun 23, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆220Dec 24, 2025Updated 3 months ago
- minimum ELF64 program to calculate its own SHA256.☆18Aug 22, 2022Updated 3 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆799Mar 9, 2026Updated 2 weeks ago
- Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reacha…☆58Feb 26, 2026Updated 3 weeks ago
- Adds a layer on top of IDA Python to make it easier to write scripts☆29Feb 28, 2026Updated 3 weeks ago
- ☆24Feb 12, 2016Updated 10 years ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆249Dec 8, 2025Updated 3 months ago