google / security-researchLinks
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
☆4,236Updated this week
Alternatives and similar repositories for security-research
Users that are interested in security-research are comparing it to the libraries listed below
Sorting:
- A collection of links related to Linux kernel security and exploitation☆6,186Updated last month
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,717Updated last year
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,606Updated last year
- Google CTF☆4,805Updated 2 weeks ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,252Updated last year
- Resources related to GitHub Security Lab☆1,538Updated 2 weeks ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,228Updated 10 months ago
- awesome list of browser exploitation tutorials☆2,222Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆8,143Updated last week
- Repository for information about 0-days exploited in-the-wild.☆836Updated last month
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆6,042Updated this week
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,335Updated 8 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,606Updated this week
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,678Updated this week
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,646Updated last year
- ✍️ A curated list of CVE PoCs.☆3,447Updated 3 years ago
- A True Instrumentable Binary Emulation Framework☆5,659Updated last month
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆5,873Updated last week
- Proof-of-concept codes created as part of security research done by Google Security Team.☆1,875Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,475Updated last year
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,256Updated last week
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,273Updated last week
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,451Updated last year
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,263Updated last month
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,838Updated 8 months ago
- A Curated list of Security Resources for all connected things☆3,014Updated last week
- Checksec☆2,225Updated last month
- Offensive Software Exploitation Course☆2,388Updated 2 years ago
- List of Awesome Advanced Windows Exploitation References☆1,520Updated 3 years ago
- Tutorials for getting started with Pwntools☆1,518Updated last year