google / security-research-pocsLinks
Proof-of-concept codes created as part of security research done by Google Security Team.
☆1,867Updated 4 years ago
Alternatives and similar repositories for security-research-pocs
Users that are interested in security-research-pocs are comparing it to the libraries listed below
Sorting:
- ☆2,508Updated 2 years ago
- A JavaScript Engine Fuzzer☆2,016Updated 4 months ago
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,656Updated 7 months ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆799Updated 3 years ago
- DOM fuzzer☆1,736Updated 6 months ago
- awesome list of browser exploitation tutorials☆2,157Updated last year
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,312Updated 3 months ago
- A collection of JavaScript engine CVEs with PoCs☆2,302Updated 5 years ago
- Resources related to GitHub Security Lab☆1,482Updated 2 weeks ago
- ✍️ A curated list of CVE PoCs.☆3,409Updated 3 years ago
- Repository for information about 0-days exploited in-the-wild.☆797Updated last month
- A Javascript library for browser exploitation☆885Updated 6 years ago
- Interactive CTF Exploration Tool☆1,656Updated 3 years ago
- A collection of browser-based side channel attack vectors.☆749Updated last year
- Reverse Engineer's Toolkit☆4,979Updated last month
- Collection of CTF Web challenges I made☆2,733Updated last year
- FuzzBench - Fuzzer benchmarking as a service.☆1,145Updated 4 months ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,005Updated 4 years ago
- A fork and successor of the Sulley Fuzzing Framework☆2,162Updated 2 weeks ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,212Updated 2 months ago
- A Course on Intermediate Level Linux Exploitation☆1,003Updated 4 years ago
- My proof-of-concept exploits for the Linux kernel☆1,471Updated 3 years ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,188Updated 2 weeks ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,562Updated 10 months ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆455Updated 2 years ago
- Collections of Orange Tsai's public presentation slides.☆732Updated 5 months ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,401Updated 10 months ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆896Updated 5 years ago
- A pure-python fully automated and unattended fuzzing framework.☆1,436Updated 4 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆537Updated 3 years ago