google / security-research
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
☆3,800Updated this week
Alternatives and similar repositories for security-research:
Users that are interested in security-research are comparing it to the libraries listed below
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,609Updated 4 months ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆5,540Updated this week
- Google CTF☆4,624Updated 2 months ago
- Gather and update all available and newest CVEs with their PoC.☆6,795Updated this week
- Resources related to GitHub Security Lab☆1,452Updated 2 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,396Updated 9 months ago
- Adversary Emulation Framework☆9,018Updated 2 weeks ago
- A collection of links related to Linux kernel security and exploitation☆5,812Updated last week
- Red Teaming Tactics and Techniques☆4,181Updated 6 months ago
- Linux privilege escalation auditing tool☆5,834Updated last year
- CTF framework and exploit development library☆12,397Updated last week
- An OOB interaction gathering server and client library☆3,636Updated this week
- Monitor linux processes without root permissions☆5,251Updated 2 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,347Updated 3 weeks ago
- A swiss army knife for pentesting networks☆8,617Updated last year
- A repository for learning various heap exploitation techniques.☆7,563Updated 2 weeks ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆5,978Updated 3 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,207Updated 7 months ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,842Updated 2 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,415Updated this week
- The Havoc Framework☆7,320Updated last month
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,769Updated this week
- ✍️ A curated list of CVE PoCs.☆3,369Updated 3 years ago
- A True Instrumentable Binary Emulation Framework☆5,287Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,879Updated last year
- The Network Execution Tool☆3,653Updated this week
- A fork of AFL for fuzzing Windows binaries☆2,400Updated 3 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,451Updated 11 months ago
- Impacket is a collection of Python classes for working with network protocols.☆13,990Updated this week
- Some setup scripts for security research tools.☆8,751Updated this week