☆22Dec 1, 2025Updated 4 months ago
Alternatives and similar repositories for Blog
Users that are interested in Blog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- doesnt work and wont work on it anymore☆10Jul 8, 2024Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆91Mar 4, 2026Updated last month
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Mar 31, 2026Updated last week
- Custom Agent and Tooling for using Nyx with Firefox☆22Jul 23, 2025Updated 8 months ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆12Dec 14, 2022Updated 3 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆89Aug 1, 2025Updated 8 months ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆52Aug 27, 2024Updated last year
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Feb 17, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Modular and extensible library for Virtual Machine Introspection☆123Updated this week
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆81Feb 5, 2025Updated last year
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- Documentation for the Curious Bolt hardware hacking multi-tool☆15Feb 1, 2024Updated 2 years ago
- Integer overflow in FreeType software, which also affects Chrome☆30Aug 27, 2025Updated 7 months ago
- Research & Study☆17Updated this week
- The CTF framework for busy hackers☆18Nov 2, 2025Updated 5 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆102Jun 20, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆175Nov 11, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆76May 22, 2025Updated 10 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- ☆39Dec 10, 2024Updated last year
- ☆278Aug 2, 2025Updated 8 months ago
- Collection of browser challenges☆140May 3, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- ☆38Mar 23, 2025Updated last year
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆14May 22, 2025Updated 10 months ago
- Linux Kernel N-day Exploit/Analysis.☆64Oct 21, 2024Updated last year
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆29Aug 18, 2025Updated 7 months ago
- command control framework☆33Apr 3, 2026Updated last week