☆216Mar 9, 2026Updated last week
Alternatives and similar repositories for Vulnerability-Disclosures
Users that are interested in Vulnerability-Disclosures are comparing it to the libraries listed below
Sorting:
- CVE-2021-42342 RCE☆42Jan 4, 2022Updated 4 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- ☆398Updated this week
- Static Binary Instrumentation tool for Windows x64 executables☆206Sep 29, 2025Updated 5 months ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- ☆60Aug 11, 2023Updated 2 years ago
- ☆80Feb 26, 2025Updated last year
- Hopefully an insightful XPC tracer that helps vulerability research by tracing server and client call stacks☆20Jul 19, 2022Updated 3 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- ☆50Aug 11, 2023Updated 2 years ago
- ☆19Nov 17, 2019Updated 6 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,303Jun 1, 2023Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- ☆44Feb 27, 2017Updated 9 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆28Oct 16, 2025Updated 5 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- Audit python packages for known vulnerabilities☆34Mar 9, 2022Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Jul 10, 2025Updated 8 months ago
- ☆44Jul 11, 2025Updated 8 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,923Updated this week
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Proof-of-Concept for CVE-2024-21345☆78Apr 26, 2024Updated last year
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- ☆16Jun 23, 2024Updated last year
- ☆19Jan 31, 2023Updated 3 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,438Updated this week
- ☆24Aug 30, 2019Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Mar 15, 2017Updated 9 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,542Oct 16, 2025Updated 5 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,890Updated this week
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- ☆28Jan 10, 2024Updated 2 years ago
- ☆335Jun 4, 2024Updated last year
- Indicator of Compromise Scanner for CVE-2019-19781☆94Mar 25, 2020Updated 5 years ago
- win32k LPE☆464Jan 27, 2022Updated 4 years ago
- ☆2,173Feb 21, 2023Updated 3 years ago