google / security-research-pocsLinks
Proof-of-concept codes created as part of security research done by Google Security Team.
☆1,869Updated 4 years ago
Alternatives and similar repositories for security-research-pocs
Users that are interested in security-research-pocs are comparing it to the libraries listed below
Sorting:
- DOM fuzzer☆1,737Updated 7 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,072Updated last week
- ☆2,509Updated 2 years ago
- Reverse Engineer's Toolkit☆4,999Updated 2 months ago
- Resources related to GitHub Security Lab☆1,495Updated last month
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- awesome list of browser exploitation tutorials☆2,172Updated last year
- This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.☆910Updated this week
- A collection of JavaScript engine CVEs with PoCs☆2,304Updated 5 years ago
- ✍️ A curated list of CVE PoCs.☆3,414Updated 3 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,438Updated 2 years ago
- My proof-of-concept exploits for the Linux kernel☆1,471Updated 3 years ago
- Vulnerability Labs for security analysis☆1,174Updated 4 years ago
- Collection of CTF Web challenges I made☆2,741Updated last year
- Reverse proxies cheatsheet☆1,822Updated last year
- Repository for information about 0-days exploited in-the-wild.☆798Updated 2 months ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆848Updated 2 months ago
- Linux Binary Exploitation☆1,333Updated 4 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆455Updated 2 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,193Updated 6 months ago
- Materials for Windows Malware Analysis training (volume 1)☆1,991Updated last year
- ☆2,663Updated last year
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆904Updated last year
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,133Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,333Updated 3 weeks ago
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,663Updated 8 months ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,235Updated last month
- A collection of browser-based side channel attack vectors.☆749Updated last year
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,220Updated 3 months ago
- Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.o…☆1,876Updated 3 weeks ago