exploits-club / bug.directoryLinks
☆53Updated 11 months ago
Alternatives and similar repositories for bug.directory
Users that are interested in bug.directory are comparing it to the libraries listed below
Sorting:
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆92Updated 3 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- Binary Exploitation Phrack CTF Challenge☆133Updated last month
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆188Updated this week
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆83Updated 3 weeks ago
- Binary Exploitation Phrack CTF Challenge☆65Updated last month
- Leveraging patch diffing to discover new vulnerabilities☆134Updated 11 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆90Updated 6 months ago
- ☆38Updated 9 months ago
- Python Command-Line Ghidra MCP☆118Updated 2 weeks ago
- The most complete code auditing platform with thousands of real-world challenges☆130Updated 3 months ago
- ☆74Updated last year
- A headless, extendable, multi-session, IDA Pro MCP framework.☆70Updated last week
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 7 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆73Updated 9 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 5 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆164Updated 10 months ago
- ☆22Updated last month
- Automated vulnerability discovery and annotation☆66Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆159Updated 2 weeks ago
- ☆82Updated last month
- Research browsers☆43Updated 4 months ago
- Userland exec PoC to be used as attack vector technique☆90Updated 3 weeks ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 6 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 9 months ago
- ☆116Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- ☆53Updated 6 years ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆79Updated last year