google / security-research
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
β3,493Updated this week
Alternatives and similar repositories for security-research:
Users that are interested in security-research are comparing it to the libraries listed below
- A collection of links related to Linux kernel security and exploitationβ5,747Updated 3 weeks ago
- β2,490Updated 2 years ago
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β6,675Updated this week
- Repository for information about 0-days exploited in-the-wild.β770Updated 3 months ago
- βοΈ A curated list of CVE PoCs.β3,360Updated 3 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviroβ¦β1,196Updated 5 months ago
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzingβ3,579Updated 3 months ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and deβ¦β1,836Updated last month
- Proof-of-concept codes created as part of security research done by Google Security Team.β1,859Updated 3 years ago
- Gather and update all available and newest CVEs with their PoC.β6,706Updated this week
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,172Updated 2 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiativeβ3,337Updated 7 months ago
- Adversary Emulation Frameworkβ8,819Updated this week
- Resources related to GitHub Security Labβ1,442Updated 3 weeks ago
- Red Teaming Tactics and Techniquesβ4,131Updated 5 months ago
- Monitor linux processes without root permissionsβ5,075Updated 2 years ago
- Offensive Software Exploitation Courseβ2,351Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,242Updated this week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,330Updated 9 months ago
- An OOB interaction gathering server and client libraryβ3,561Updated this week
- A repository for learning various heap exploitation techniques.β7,466Updated this week
- Linux privilege escalation auditing toolβ5,761Updated 11 months ago
- awesome-linux-rootkitsβ1,759Updated 2 weeks ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ11,166Updated 3 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.β1,807Updated 9 months ago
- Tutorials for getting started with Pwntoolsβ1,432Updated 3 months ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerneβ¦β1,512Updated last week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifiβ¦β2,275Updated last month
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,280Updated 7 months ago
- BinAbsInspector: Vulnerability Scanner for Binariesβ1,593Updated 7 months ago