nickboucher / trojan-source
Trojan Source: Invisible Vulnerabilities
☆1,232Updated last year
Related projects: ⓘ
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆775Updated last year
- ☆1,489Updated 2 years ago
- ☆2,492Updated last year
- Connect like there is no firewall. Securely.☆1,458Updated 2 weeks ago
- Hash collisions and exploitations☆3,040Updated 5 months ago
- Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.☆785Updated 5 months ago
- Kernel exploitation technique☆561Updated 10 months ago
- ☆2,085Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,344Updated last year
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,322Updated 2 months ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆862Updated last year
- Resources related to GitHub Security Lab☆1,392Updated last month
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆858Updated 4 months ago
- Repository for information about 0-days exploited in-the-wild.☆752Updated 3 weeks ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,897Updated last year
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,098Updated 3 weeks ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,551Updated 11 months ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,713Updated 2 years ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆784Updated 7 months ago
- ☆440Updated 2 years ago
- CVE-2022-0995 exploit☆492Updated 2 years ago
- Gather and update all available and newest CVEs with their PoC.☆6,452Updated this week
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆3,273Updated last week
- Portable Executable reversing tool with a friendly GUI☆2,660Updated this week
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,751Updated 5 months ago
- Apache Log4j 远程代码执行☆71Updated last year
- Reverse proxies cheatsheet☆1,757Updated 10 months ago
- Credentials Dumper for Linux using eBPF☆1,111Updated last week
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,064Updated 2 years ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,456Updated 3 months ago