google / security-researchLinks
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
☆4,108Updated last week
Alternatives and similar repositories for security-research
Users that are interested in security-research are comparing it to the libraries listed below
Sorting:
- Resources related to GitHub Security Lab☆1,515Updated last week
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,680Updated 9 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,242Updated 11 months ago
- Gather and update all available and newest CVEs with their PoC.☆7,098Updated this week
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,200Updated 7 months ago
- A collection of links related to Linux kernel security and exploitation☆6,030Updated 3 weeks ago
- Repository for information about 0-days exploited in-the-wild.☆815Updated 2 weeks ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,423Updated last year
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,538Updated last year
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆5,864Updated this week
- Google CTF☆4,753Updated 7 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,384Updated last year
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,111Updated this week
- Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023☆1,484Updated last month
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,419Updated last week
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,281Updated last month
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,635Updated 3 weeks ago
- ☆2,510Updated 2 years ago
- Conference presentation slides☆1,752Updated 2 months ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,629Updated last year
- A repository for learning various heap exploitation techniques.☆7,801Updated 3 weeks ago
- Offensive Software Exploitation Course☆2,374Updated 2 years ago
- Quickly find differences and similarities in disassembled code☆2,633Updated last week
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆5,749Updated this week
- A tool for checking the security hardening options of the Linux kernel☆1,921Updated last week
- A True Instrumentable Binary Emulation Framework☆5,543Updated 2 weeks ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,219Updated 2 months ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,397Updated this week
- A powerful and user-friendly binary analysis platform!☆8,063Updated this week
- awesome list of browser exploitation tutorials☆2,184Updated last year