Trojan Source: Invisible Vulnerabilities
☆1,275Apr 26, 2023Updated 2 years ago
Alternatives and similar repositories for trojan-source
Users that are interested in trojan-source are comparing it to the libraries listed below
Sorting:
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,867Sep 10, 2025Updated 6 months ago
- Gather and update all available and newest CVEs with their PoC.☆7,589Updated this week
- ☆2,079Dec 13, 2021Updated 4 years ago
- Web Attack Cheat Sheet☆4,400Mar 2, 2026Updated last week
- ☆2,511Jan 2, 2023Updated 3 years ago
- Reverse Engineer's Toolkit☆5,170May 1, 2025Updated 10 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,384Updated this week
- Rust Weaponization for Red Team Engagements.☆2,990Apr 25, 2024Updated last year
- ☆1,455Jan 23, 2024Updated 2 years ago
- Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.☆14,350Updated this week
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,482Jul 12, 2024Updated last year
- Ghidra is a software reverse engineering (SRE) framework☆65,593Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,111Mar 12, 2024Updated last year
- OSS-Fuzz - continuous fuzzing for open source software.☆11,944Updated this week
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,698Dec 22, 2021Updated 4 years ago
- A little tool to play with Windows security☆21,316May 11, 2025Updated 10 months ago
- Open-Source Shellcode & PE Packer☆2,071Feb 3, 2024Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,191Updated this week
- CVE-2021-40444 PoC☆1,719Dec 25, 2021Updated 4 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,187May 1, 2025Updated 10 months ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆226Jun 1, 2021Updated 4 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,564Oct 31, 2025Updated 4 months ago
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆52,848Updated this week
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,607Nov 14, 2025Updated 3 months ago
- Find secrets with Gitleaks 🔑☆25,320Feb 21, 2026Updated 2 weeks ago
- Execute ELF files without dropping them on disk☆503Jun 28, 2024Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,384Jan 31, 2025Updated last year
- Apache Log4j 远程代码执行☆89May 14, 2023Updated 2 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆582Mar 8, 2024Updated 2 years ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- Adversary Emulation Framework☆10,798Updated this week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,553Updated this week
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,411Updated this week
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,314Updated this week
- ☆705Nov 27, 2024Updated last year
- The Havoc Framework☆8,203Dec 18, 2025Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,937Updated this week