HN Security's advisories.
☆22Nov 7, 2025Updated 3 months ago
Alternatives and similar repositories for vulns
Users that are interested in vulns are comparing it to the libraries listed below
Sorting:
- NASM macOS translation of the source code listings distributed with the Art of 64-bit Assembly Language book.☆20Nov 10, 2025Updated 3 months ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆30Jan 11, 2026Updated last month
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Jan 20, 2026Updated last month
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- OGHarn: Oracle-guided Fuzzing Harness Generation☆51Dec 9, 2025Updated 2 months ago
- ☆23Nov 2, 2021Updated 4 years ago
- ☆29Dec 10, 2020Updated 5 years ago
- ☆26May 10, 2021Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 3 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆109Feb 23, 2026Updated last week
- ☆10Sep 5, 2022Updated 3 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 3 months ago
- ☆32Oct 13, 2025Updated 4 months ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 11 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆126Updated this week
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- linux kernel internals research details☆45Jan 9, 2024Updated 2 years ago
- Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell☆11Apr 18, 2022Updated 3 years ago
- ☆10Jun 5, 2023Updated 2 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- Wireshark QMI dissector for Qualcomm based modems☆14Oct 2, 2025Updated 5 months ago
- Code used in analysis and visualisation of IUCN threat maps☆15Aug 26, 2021Updated 4 years ago
- ☆13Jan 23, 2026Updated last month
- ☆11Jul 26, 2024Updated last year
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Bill of Materials and all parts for Ultimaker Original Heated Bed Upgrade☆12Sep 7, 2021Updated 4 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- ☆10May 12, 2022Updated 3 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated last year