Read only mirror - No pull requests
☆20May 7, 2021Updated 4 years ago
Alternatives and similar repositories for expliot
Users that are interested in expliot are comparing it to the libraries listed below
Sorting:
- ☆18Aug 5, 2020Updated 5 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 5 months ago
- Private keys that have become public ...☆21Jun 8, 2022Updated 3 years ago
- ☆15Aug 3, 2023Updated 2 years ago
- ☆20Dec 4, 2023Updated 2 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- ☆33Jan 14, 2026Updated 2 months ago
- AFL enhanced for concurrency bug and vulnerabilities☆19Sep 18, 2020Updated 5 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- RuCTF 2022. Developed with ♥ by Hackerdom team☆11May 22, 2022Updated 3 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- ☆18Nov 26, 2025Updated 3 months ago
- Diagnostic Framework for LLMs and MLLMs☆35Mar 2, 2026Updated 2 weeks ago
- Fuzz testing framework for network protocols.☆17May 23, 2020Updated 5 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆83Oct 15, 2025Updated 5 months ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- This is the project of LearnAFL.☆28Aug 27, 2020Updated 5 years ago
- ☆13Mar 1, 2020Updated 6 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- Disassemblers with various trimming methodologies☆15Jan 1, 2025Updated last year
- ☆11Jul 4, 2023Updated 2 years ago
- Volatility MindMap & Cheat Sheet☆28Feb 6, 2022Updated 4 years ago
- 我的演讲 ppt or pdf 归档库☆10Mar 28, 2021Updated 4 years ago
- ☆32Apr 2, 2024Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆23Mar 24, 2022Updated 3 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Jun 18, 2024Updated last year
- μSBS: Static Binary Sanitization of Bare-metal Embedded Devices☆33Jul 14, 2022Updated 3 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆34Jul 6, 2023Updated 2 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- CSAW Embedded Security Challenge 2019☆37Nov 24, 2019Updated 6 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago
- ☆35Jun 5, 2023Updated 2 years ago
- Software for the QO-100 groundstation of EA4GPZ☆10Aug 8, 2022Updated 3 years ago
- A use-after-free checker based on SVF.☆20Nov 29, 2017Updated 8 years ago