google / security-research-pocsLinks
Proof-of-concept codes created as part of security research done by Google Security Team.
☆1,877Updated 4 years ago
Alternatives and similar repositories for security-research-pocs
Users that are interested in security-research-pocs are comparing it to the libraries listed below
Sorting:
- DOM fuzzer☆1,763Updated last year
- ☆2,509Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,308Updated 6 years ago
- A collection of browser-based side channel attack vectors.☆755Updated last year
- Vulncode-DB project☆577Updated 3 years ago
- My proof-of-concept exploits for the Linux kernel☆1,536Updated 2 months ago
- PoC exploits for software vulnerabilities☆684Updated 4 years ago
- Resources related to GitHub Security Lab☆1,555Updated last week
- Interactive CTF Exploration Tool☆1,665Updated 4 years ago
- Welcome to the XSS Challenge Wiki!☆1,596Updated 5 years ago
- ✍️ A curated list of CVE PoCs.☆3,458Updated 3 years ago
- 🔪Browser logic vulnerabilities☆699Updated 4 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆623Updated 5 years ago
- Vulnerability Labs for security analysis☆1,175Updated 4 years ago
- CTF write-ups by Plaid Parliament of Pwning☆799Updated last year
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,732Updated last year
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆460Updated 3 years ago
- ☆702Updated last year
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,248Updated 11 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,953Updated 2 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,279Updated this week
- Cure53 Browser Security White Paper☆300Updated 8 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,802Updated 3 years ago
- A Course on Intermediate Level Linux Exploitation☆1,005Updated 5 years ago
- Collection of CTF Web challenges I made☆2,801Updated 3 months ago
- Some of my exploits.☆594Updated 4 years ago
- A pure-python fully automated and unattended fuzzing framework.☆1,451Updated 4 years ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,347Updated 9 months ago
- ☆1,109Updated 5 years ago