google / security-research-pocs
Proof-of-concept codes created as part of security research done by Google Security Team.
☆1,859Updated 3 years ago
Alternatives and similar repositories for security-research-pocs:
Users that are interested in security-research-pocs are comparing it to the libraries listed below
- DOM fuzzer☆1,711Updated 2 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆3,493Updated this week
- awesome list of browser exploitation tutorials☆2,083Updated last year
- A collection of links related to Linux kernel security and exploitation☆5,747Updated 3 weeks ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,257Updated last week
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,128Updated last week
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,836Updated last month
- ☆2,490Updated 2 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,298Updated 5 years ago
- My proof-of-concept exploits for the Linux kernel☆1,461Updated 2 years ago
- Reverse Engineer's Toolkit☆4,874Updated 9 months ago
- Repository for information about 0-days exploited in-the-wild.☆770Updated 3 months ago
- A collection of links related to VMware escape exploits☆1,394Updated 4 months ago
- Materials for Windows Malware Analysis training (volume 1)☆1,958Updated 6 months ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,512Updated last week
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆885Updated 8 months ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆798Updated 2 years ago
- A Javascript library for browser exploitation☆876Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,404Updated 6 years ago
- ✍️ A curated list of CVE PoCs.☆3,360Updated 3 years ago
- Resources related to GitHub Security Lab☆1,442Updated 3 weeks ago
- A curated list of awesome reversing resources☆4,157Updated last year
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,254Updated 2 years ago
- A collection of browser-based side channel attack vectors.☆746Updated 10 months ago
- Interactive CTF Exploration Tool☆1,646Updated 3 years ago
- A self-hosted Fuzzing-As-A-Service platform☆2,824Updated last year
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,360Updated 6 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,124Updated last year
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,579Updated 3 months ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆890Updated 4 years ago