☆80Jun 7, 2024Updated last year
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- UPDATED: All the action is at https://github.com/xsscx/srd☆12Jul 12, 2021Updated 4 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 3 months ago
- ☆18Sep 29, 2023Updated 2 years ago
- arm64 IOKit class dumper☆21Feb 22, 2025Updated last year
- Binary Ninja loader for A12 SEP firmware☆29Feb 4, 2021Updated 5 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- ☆135Dec 5, 2025Updated 3 months ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 3 weeks ago
- WTF Snapshot fuzzing of macOS targets☆98May 31, 2024Updated last year
- Detailed Airplay Protocol Specification☆25Jul 8, 2022Updated 3 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆155Jan 23, 2024Updated 2 years ago
- I will provide details and pocs for some bugs I found.☆41Apr 15, 2024Updated last year
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- ☆24Sep 12, 2024Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Jul 27, 2022Updated 3 years ago
- ☆30Sep 5, 2025Updated 6 months ago
- ☆68Jan 25, 2022Updated 4 years ago
- ☆13May 17, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆16Aug 19, 2024Updated last year
- A command line tool to query the Launch Services database☆15Jul 28, 2018Updated 7 years ago
- ☆16Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆24Apr 8, 2022Updated 3 years ago
- Tool for decrypting and encrypting Pentium II microcode patches.☆29May 21, 2025Updated 9 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- ☆11Dec 22, 2020Updated 5 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- ☆13Apr 13, 2023Updated 2 years ago
- ☆11May 13, 2024Updated last year
- CoreFollowUp phishing attack on macOS☆15Mar 15, 2022Updated 3 years ago
- ☆14Aug 28, 2023Updated 2 years ago
- ☆11May 17, 2024Updated last year