google / security-research-pocs
Proof-of-concept codes created as part of security research done by Google Security Team.
☆1,864Updated 3 years ago
Alternatives and similar repositories for security-research-pocs:
Users that are interested in security-research-pocs are comparing it to the libraries listed below
- ☆2,493Updated 2 years ago
- A collection of browser-based side channel attack vectors.☆745Updated 10 months ago
- DOM fuzzer☆1,713Updated 2 months ago
- A collection of JavaScript engine CVEs with PoCs☆2,297Updated 5 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆798Updated 2 years ago
- My proof-of-concept exploits for the Linux kernel☆1,462Updated 2 years ago
- Reverse Engineer's Toolkit☆4,886Updated 10 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆3,598Updated this week
- ☆966Updated 4 years ago
- Collection of CTF Web challenges I made☆2,710Updated last year
- Interactive CTF Exploration Tool☆1,649Updated 3 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,064Updated last year
- A Javascript library for browser exploitation☆878Updated 6 years ago
- A collection of links related to Linux kernel security and exploitation☆5,770Updated last month
- ✍️ A curated list of CVE PoCs.☆3,369Updated 3 years ago
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,715Updated 6 months ago
- Google CTF☆4,595Updated last month
- Miscellaneous exploit code☆1,543Updated last year
- ☆1,257Updated last week
- awesome list of browser exploitation tutorials☆2,113Updated last year
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,518Updated 2 weeks ago
- A tool to dump the login password from the current linux user☆3,893Updated last year
- Some of my exploits.☆576Updated 3 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,143Updated this week
- CTF write-ups by Plaid Parliament of Pwning☆776Updated 8 months ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,776Updated 2 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,864Updated 9 months ago
- Proof-of-concept for the ZombieLoad attack☆813Updated 3 years ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,724Updated this week
- 🔪Browser logic vulnerabilities☆690Updated 4 years ago