google / security-research-pocs
Proof-of-concept codes created as part of security research done by Google Security Team.
☆1,859Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for security-research-pocs
- ☆2,492Updated last year
- DOM fuzzer☆1,686Updated 2 months ago
- Resources related to GitHub Security Lab☆1,411Updated 2 months ago
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,510Updated 2 weeks ago
- ✍️ A curated list of CVE PoCs.☆3,320Updated 2 years ago
- A collection of links related to Linux kernel security and exploitation☆5,616Updated last week
- My proof-of-concept exploits for the Linux kernel☆1,449Updated 2 years ago
- A collection of links related to VMware escape exploits☆1,359Updated 2 months ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,341Updated 4 months ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆794Updated 2 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,094Updated last month
- Interactive CTF Exploration Tool☆1,641Updated 3 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,289Updated 5 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,773Updated 4 months ago
- Repository for information about 0-days exploited in-the-wild.☆759Updated 2 weeks ago
- Reverse Engineer's Toolkit☆4,824Updated 6 months ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,242Updated 2 years ago
- A JavaScript Engine Fuzzer☆1,889Updated this week
- a series tutorial for linux exploit development to newbie.☆554Updated 7 months ago
- Collection of CTF Web challenges I made☆2,684Updated last year
- awesome list of browser exploitation tutorials☆2,052Updated last year
- Materials for Windows Malware Analysis training (volume 1)☆1,936Updated 4 months ago
- ☆954Updated 3 years ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,230Updated last week
- Some helpful preload libraries for pwning stuff.☆1,573Updated 6 months ago
- Set of tests for fuzzing engines☆1,431Updated 3 years ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,075Updated 2 months ago
- PoC exploits for software vulnerabilities☆675Updated 3 years ago
- List of Awesome Advanced Windows Exploitation References☆1,456Updated 2 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,335Updated 7 months ago