General tips and advice for becoming interested in research, finding a suitable topic, and setting goals.
☆28Mar 17, 2021Updated 5 years ago
Alternatives and similar repositories for research101
Users that are interested in research101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 28, 2019Updated 6 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- ☆22Dec 1, 2021Updated 4 years ago
- Script to crawl crbugs (Chromium Issues).☆10Jul 15, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Resources for Browser Security Research☆54Sep 17, 2022Updated 3 years ago
- Build a database of libc offsets and ld.so files to simplify exploitation☆13Sep 13, 2018Updated 7 years ago
- [ICSE2020] UAFL DataSet☆12Dec 10, 2022Updated 3 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- ☆14Mar 9, 2026Updated 2 weeks ago
- ☆22Jul 6, 2018Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆27Mar 16, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- Extensible Platform for Malware Analysis☆17Jan 14, 2021Updated 5 years ago
- ☆16Feb 25, 2024Updated 2 years ago
- An extra light, extra simple Objective-C hooking framework☆16Jun 18, 2025Updated 9 months ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆40Aug 12, 2025Updated 7 months ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- A console debugger using DbgX and Terminal.Gui☆30Oct 12, 2022Updated 3 years ago
- Repo to store binary targets☆20Updated this week
- Disable App Thinning on iOS☆13Oct 14, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Some Vulnerability in the some protocol are collected.☆109May 29, 2024Updated last year
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64May 21, 2023Updated 2 years ago
- Easily patch ASR on 64-bit devices.☆11Jul 31, 2022Updated 3 years ago
- Latex template based on the typographic memoir class for formatting PhD dissertations. Suitable for any areas but devised for computer sc…☆18May 14, 2012Updated 13 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆829Mar 8, 2021Updated 5 years ago
- Mach-O view plugin☆20Mar 7, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Research simulation toolkit for federated learning☆13Nov 7, 2020Updated 5 years ago
- DBGBench Website:☆19Feb 24, 2021Updated 5 years ago
- A domain specific language for requirements engineering. Besides the DSL, the REL framework contains Python integration, and a Visual Stu…☆11Apr 24, 2022Updated 3 years ago
- Cottontail: A LLM-Driven Concolic Execution Engine (Accepted by IEEE S&P'26)☆37Dec 4, 2025Updated 3 months ago
- All about pwning, reversing, and the road to exploit development☆18Aug 21, 2022Updated 3 years ago
- ☆21Aug 20, 2025Updated 7 months ago
- rPPG-based Biometric Authentication☆11Jun 3, 2025Updated 9 months ago