General tips and advice for becoming interested in research, finding a suitable topic, and setting goals.
☆28Mar 17, 2021Updated 5 years ago
Alternatives and similar repositories for research101
Users that are interested in research101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- ☆22Dec 1, 2021Updated 4 years ago
- Resources for Browser Security Research☆57Sep 17, 2022Updated 3 years ago
- [ICSE2020] UAFL DataSet☆12Dec 10, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11Jan 6, 2020Updated 6 years ago
- ☆14Aug 25, 2018Updated 7 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- ☆14Updated this week
- ☆22Jul 6, 2018Updated 7 years ago
- ☆27Mar 16, 2023Updated 3 years ago
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- Extensible Platform for Malware Analysis☆17Jan 14, 2021Updated 5 years ago
- ☆16Feb 25, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An extra light, extra simple Objective-C hooking framework☆16Jun 18, 2025Updated 9 months ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆39Aug 12, 2025Updated 8 months ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- Repo to store binary targets☆20Updated this week
- A python parser for iOS backups☆12Dec 24, 2023Updated 2 years ago
- Disable App Thinning on iOS☆13Oct 14, 2019Updated 6 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- ☆17Aug 31, 2014Updated 11 years ago
- Some Vulnerability in the some protocol are collected.☆109May 29, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64May 21, 2023Updated 2 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆28Feb 3, 2021Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆833Mar 8, 2021Updated 5 years ago
- Mach-O view plugin☆20Mar 7, 2024Updated 2 years ago
- DBGBench Website:☆19Feb 24, 2021Updated 5 years ago
- A domain specific language for requirements engineering. Besides the DSL, the REL framework contains Python integration, and a Visual Stu…☆11Apr 24, 2022Updated 3 years ago
- Cottontail: A LLM-Driven Concolic Execution Engine (Accepted by IEEE S&P'26)☆40Dec 4, 2025Updated 4 months ago
- ☆22Aug 20, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Opencore EFI for Dell Precision Tower 3620, Catalina 10.15.6☆15Oct 22, 2020Updated 5 years ago
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago
- afl/afl++ with a hierarchical seed scheduler☆56Feb 19, 2022Updated 4 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- 36c3 junior ctf challanges☆11Dec 29, 2019Updated 6 years ago
- Associated paper: https://arxiv.org/abs/2010.04971☆14Jan 2, 2022Updated 4 years ago
- ☆34Apr 7, 2022Updated 4 years ago