google / security-research
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
☆3,398Updated last week
Related projects ⓘ
Alternatives and complementary repositories for security-research
- Gather and update all available and newest CVEs with their PoC.☆6,587Updated this week
- A collection of links related to Linux kernel security and exploitation☆5,632Updated 2 weeks ago
- A repository for learning various heap exploitation techniques.☆7,232Updated 2 months ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,531Updated this week
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,513Updated 3 weeks ago
- The Havoc Framework☆6,860Updated this week
- ✍️ A curated list of CVE PoCs.☆3,324Updated 2 years ago
- Adversary Emulation Framework☆8,553Updated last week
- Resources related to GitHub Security Lab☆1,415Updated 3 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,347Updated 7 months ago
- Proof-of-concept codes created as part of security research done by Google Security Team.☆1,860Updated 3 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆4,879Updated this week
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,176Updated 3 months ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,475Updated 2 weeks ago
- awesome list of browser exploitation tutorials☆2,058Updated last year
- Repository for information about 0-days exploited in-the-wild.☆759Updated 3 weeks ago
- CTF framework and exploit development library☆12,127Updated 2 weeks ago
- awesome-linux-rootkits☆1,723Updated last year
- Linux privilege escalation auditing tool☆5,660Updated 9 months ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,777Updated 4 months ago
- Google CTF☆4,532Updated last week
- An OOB interaction gathering server and client library☆3,448Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆6,593Updated 2 weeks ago
- Red Teaming Tactics and Techniques☆4,065Updated 2 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,226Updated 5 months ago
- A swiss army knife for pentesting networks☆8,457Updated 11 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,786Updated 7 months ago
- A collection of resources for linux reverse engineering☆1,994Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,678Updated last month
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆2,969Updated last week