exploits-club / bug.directory
☆36Updated 5 months ago
Alternatives and similar repositories for bug.directory:
Users that are interested in bug.directory are comparing it to the libraries listed below
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆114Updated last week
- ☆73Updated 8 months ago
- ☆35Updated 3 months ago
- Malware Analysis tools☆25Updated 6 months ago
- Powershell Linter☆50Updated 2 weeks ago
- Cheat sheet to detect and remove linux kernel rootkit☆54Updated 3 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated last month
- ☆49Updated 6 years ago
- Get information about stripped rust executables☆27Updated last week
- Leveraging patch diffing to discover new vulnerabilities☆113Updated 5 months ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆65Updated 11 months ago
- ☆23Updated 2 months ago
- ☆39Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 10 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆52Updated last year
- ☆59Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- ☆105Updated 8 months ago
- ☆61Updated 8 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆14Updated 2 months ago
- ☆67Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Writeups for CTF challenges☆30Updated last year
- ☆51Updated 5 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated 10 months ago
- ☆65Updated 2 months ago