hectorgie / PoC-in-GitHubView external linksLinks
☆19Jan 2, 2021Updated 5 years ago
Alternatives and similar repositories for PoC-in-GitHub
Users that are interested in PoC-in-GitHub are comparing it to the libraries listed below
Sorting:
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- ☆10Oct 8, 2022Updated 3 years ago
- ☆16Apr 15, 2019Updated 6 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 4 years ago
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆21Mar 24, 2021Updated 4 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Aug 11, 2023Updated 2 years ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆21Aug 31, 2021Updated 4 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Jun 10, 2017Updated 8 years ago
- 3D Accelerated Exploitation☆53Feb 22, 2019Updated 6 years ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆21Mar 26, 2021Updated 4 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- 阿里云先知社区xss挑战☆22Sep 17, 2017Updated 8 years ago
- ☆27Mar 16, 2023Updated 2 years ago
- qemu vulnerablity.☆55May 25, 2021Updated 4 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 4 years ago
- A collection of various exploits☆28Sep 17, 2024Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Apr 12, 2023Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 4 years ago
- ☆33Jul 4, 2023Updated 2 years ago
- A set of Code-ql/Joern queries to find vulnerabilities☆67May 22, 2021Updated 4 years ago
- ☆68Jan 6, 2023Updated 3 years ago
- A coverage-based software testing tool☆34Dec 11, 2020Updated 5 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆29Mar 6, 2024Updated last year
- ☆86Oct 29, 2023Updated 2 years ago
- A collection of POP exploits.☆30Feb 22, 2021Updated 4 years ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆24Updated this week
- Tool that automates some useful structure routines in IDA PRO☆83Mar 20, 2024Updated last year
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆14Oct 23, 2025Updated 3 months ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆78Sep 15, 2020Updated 5 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- Python infrastructure to train paths selectors for symbolic execution engines.☆11Updated this week