iamavu / vr-rev-jobsView external linksLinks
list of organizations offering vulnerability research/reverse engineering jobs
☆109Updated this week
Alternatives and similar repositories for vr-rev-jobs
Users that are interested in vr-rev-jobs are comparing it to the libraries listed below
Sorting:
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- ☆70Jul 24, 2025Updated 6 months ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- A list of bizarre crackmes☆145Feb 7, 2026Updated last week
- Statistics from our binary transformation framework☆10Jan 16, 2025Updated last year
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Solidity gas optimization notes☆10Apr 27, 2023Updated 2 years ago
- ☆30Nov 25, 2025Updated 2 months ago
- ☆44Mar 16, 2024Updated last year
- Detect or infer the Anchor, Solana, and Rust versions needed for an Anchor project.☆17Feb 4, 2026Updated last week
- ☆55Aug 26, 2022Updated 3 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Feb 12, 2025Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆90Nov 13, 2025Updated 3 months ago
- weggli ruleset scanner for source code and binaries☆37Nov 16, 2025Updated 3 months ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆139Oct 21, 2024Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Oct 18, 2023Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆34Feb 4, 2025Updated last year
- ☆38Jan 6, 2025Updated last year
- ☆12Oct 29, 2015Updated 10 years ago
- ☆23Jan 27, 2026Updated 3 weeks ago
- ☆13Feb 24, 2024Updated last year
- Exploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476)☆19Jun 20, 2023Updated 2 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆76Apr 10, 2025Updated 10 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Nov 22, 2024Updated last year
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- ☆65Apr 28, 2024Updated last year
- User-agent Fuzzing Library. This repository holds data of all the user agents in the `user_agents.json` file, which can be used directly …☆16Jun 29, 2025Updated 7 months ago
- Frida plugin for Binary Ninja☆20Jan 12, 2025Updated last year
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 4 months ago