microsoft / MSRC-Security-ResearchLinks
Security Research from the Microsoft Security Response Center (MSRC)
☆1,376Updated last year
Alternatives and similar repositories for MSRC-Security-Research
Users that are interested in MSRC-Security-Research are comparing it to the libraries listed below
Sorting:
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,256Updated 2 months ago
- A fork of AFL for fuzzing Windows binaries☆2,515Updated last month
- DOM fuzzer☆1,769Updated last year
- Project Zero Docs and Tools☆811Updated 3 months ago
- Checksec, but for Windows: static detection of security mitigations in executables☆609Updated last year
- OPCDE Cybersecurity Conference Materials☆619Updated 5 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆520Updated 7 months ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆742Updated last year
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,681Updated last year
- ☆624Updated 2 years ago
- Proof of Concepts (PE, PDF...)☆1,531Updated last year
- A fast, parallel test case minimization tool.☆975Updated 5 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,159Updated 5 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆839Updated last year
- ☆833Updated 3 years ago
- A binary static analysis tool that provides security and correctness results for Windows Portable Executable and *nix ELF binary formats☆833Updated 2 weeks ago
- A collection of links related to VMware escape exploits☆1,480Updated last year
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,275Updated 2 months ago
- A lightweight dynamic instrumentation library☆1,298Updated 9 months ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,273Updated 3 years ago
- Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.☆1,296Updated 2 years ago
- The 'exploitable' GDB plugin☆743Updated 3 years ago
- Driller: augmenting AFL with symbolic execution!☆964Updated 9 months ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,843Updated 10 months ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆727Updated 2 years ago
- An archive of low-level CTF challenges developed over the years☆652Updated 4 years ago
- Set of tests for fuzzing engines☆1,457Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆851Updated 5 years ago
- Tracking CVEs for the linux Kernel☆752Updated last year
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆438Updated 9 months ago