list of organizations offering vulnerability research/reverse engineering jobs
☆113Feb 25, 2026Updated 3 weeks ago
Alternatives and similar repositories for vr-rev-jobs
Users that are interested in vr-rev-jobs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- A list of bizarre crackmes☆147Mar 13, 2026Updated last week
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- ☆23Jan 27, 2026Updated last month
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 5 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆36Feb 4, 2025Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- ☆71Jul 24, 2025Updated 8 months ago
- Statistics from our binary transformation framework☆12Jan 16, 2025Updated last year
- Solidity gas optimization notes☆10Apr 27, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- ☆56Aug 26, 2022Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- A collection of my scripts for research☆12Jul 28, 2025Updated 7 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Oct 18, 2023Updated 2 years ago
- ☆44Mar 16, 2024Updated 2 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- Persistent Powershell backdoor tool {😈}☆120Jul 31, 2024Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆140Oct 21, 2024Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆86Jul 9, 2025Updated 8 months ago
- Exploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476)☆19Jun 20, 2023Updated 2 years ago
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- ☆70Jul 6, 2023Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- Play with libmalloc☆18Jan 2, 2024Updated 2 years ago
- ☆65Apr 28, 2024Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 9 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Feb 23, 2026Updated last month
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆61Nov 22, 2024Updated last year
- Pretty x86 instruction reference site generator☆63Mar 20, 2022Updated 4 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Instruction decoder generator☆36May 5, 2025Updated 10 months ago
- ☆12Mar 28, 2022Updated 3 years ago