interruptlabs / VRDP-C-PythonLinks
This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Program.
☆77Updated this week
Alternatives and similar repositories for VRDP-C-Python
Users that are interested in VRDP-C-Python are comparing it to the libraries listed below
Sorting:
- ☆23Updated 6 months ago
- ☆37Updated 7 months ago
- Ansible build for Afl++ Frida-Mode☆24Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated this week
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆89Updated last month
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 5 months ago
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- The most complete code auditing platform with thousands of real-world challenges☆125Updated last month
- examples of using radius2 to solve reversing challenges☆35Updated 7 months ago
- Leveraging patch diffing to discover new vulnerabilities☆127Updated 9 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- ☆41Updated last week
- Backend development stack for agents☆20Updated last week
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- ☆59Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- External Playbooks for Public Access☆39Updated 6 months ago
- BINARLY Research Tools and PoCs☆36Updated 10 months ago
- ☆16Updated 9 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆87Updated 4 months ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆61Updated 2 months ago
- Proof-of-concept modular implant platform leveraging v8☆53Updated 5 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆21Updated 7 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆160Updated 8 months ago
- ☆19Updated last month
- MLOps Attack Toolkit☆21Updated last week
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆19Updated 3 months ago
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆50Updated 2 weeks ago