iosifache / ossfortress
Workshop for finding software vulnerabilities using open source tools, which includes a Goat-like Python and C application
☆26Updated 6 months ago
Alternatives and similar repositories for ossfortress:
Users that are interested in ossfortress are comparing it to the libraries listed below
- Coverage-Guided Greybox Distributed Fuzzer☆128Updated 7 months ago
- Trail of Bits Testing Handbook☆64Updated last week
- Open Source eBPF Malware Analysis Framework☆47Updated 4 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆56Updated 4 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆71Updated last year
- ☆23Updated last month
- Publications from the eBPF foundation☆22Updated 4 months ago
- 🔗 A curated list of awesome Caido related projects☆35Updated 5 months ago
- CodeQL queries developed by Trail of Bits☆89Updated 2 months ago
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 5 months ago
- ☆32Updated 2 years ago
- ☆31Updated 2 years ago
- ☆83Updated 8 months ago
- Manager of third-party sources of Semgrep rules 🗂☆79Updated 7 months ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆33Updated 2 years ago
- ☆67Updated last month
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated this week
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last week
- Automatically fuzz Rust projects from scratch☆55Updated 10 months ago
- ☆77Updated 9 months ago
- POC of CVE-2023-35086 only DoS☆45Updated last year
- Utility to find hidden Linux kernel modules☆144Updated 2 months ago
- Automatic fuzz targets generation for Golang packages☆53Updated 2 months ago
- Userland exec PoC to be used as attack vector technique☆68Updated last month
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆34Updated this week
- Database interaction layer to store open-asset-models in sqlite3 and postgres☆18Updated 2 weeks ago