list of organizations offering vulnerability research/reverse engineering jobs
☆118Feb 25, 2026Updated last month
Alternatives and similar repositories for vr-rev-jobs
Users that are interested in vr-rev-jobs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- A list of bizarre crackmes☆146Mar 24, 2026Updated 3 weeks ago
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- ☆24Jan 27, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- Frontend for RAS portal of SPO IITK in NextJS☆16Jan 22, 2026Updated 2 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 6 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆36Feb 4, 2025Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- ☆71Jul 24, 2025Updated 8 months ago
- Solidity gas optimization notes☆10Apr 27, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated 2 years ago
- ☆56Aug 26, 2022Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- A collection of my scripts for research☆12Jul 28, 2025Updated 8 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Oct 18, 2023Updated 2 years ago
- ☆44Mar 16, 2024Updated 2 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- Persistent Powershell backdoor tool {😈}☆121Jul 31, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Leveraging patch diffing to discover new vulnerabilities☆140Oct 21, 2024Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Jul 9, 2025Updated 9 months ago
- weggli ruleset scanner for source code and binaries☆40Nov 16, 2025Updated 5 months ago
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- ☆70Jul 6, 2023Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- ☆65Apr 28, 2024Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Detect or infer the Anchor, Solana, and Rust versions needed for an Anchor project.☆15Apr 7, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 10 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆61Nov 22, 2024Updated last year
- Pretty x86 instruction reference site generator☆64Mar 20, 2022Updated 4 years ago
- Supplement of the ICFP'22 paper "‘do’ Unchained: Embracing Local Imperativity in a Purely Functional Language"☆14Feb 15, 2025Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆12Mar 28, 2022Updated 4 years ago