☆22Dec 1, 2025Updated 5 months ago
Alternatives and similar repositories for Blog
Users that are interested in Blog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated this week
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆91Mar 4, 2026Updated 2 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 4 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Mar 31, 2026Updated last month
- Custom Agent and Tooling for using Nyx with Firefox☆22Jul 23, 2025Updated 9 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆12Dec 14, 2022Updated 3 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆87Aug 1, 2025Updated 9 months ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆52Aug 27, 2024Updated last year
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Feb 17, 2025Updated last year
- Modular and extensible library for Virtual Machine Introspection☆138Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Integer overflow in FreeType software, which also affects Chrome☆30Aug 27, 2025Updated 8 months ago
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆81Feb 5, 2025Updated last year
- Mickey's Blogs☆42Mar 25, 2026Updated last month
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆102Jun 20, 2025Updated 11 months ago
- ☆21Mar 22, 2025Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- User friendly ways to parse small code snippets into data types in Ghidra.☆33May 11, 2026Updated last week
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆176Nov 11, 2024Updated last year
- Command-line tools to work with Microchip Crypto-Authentication devices.☆27Oct 26, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆79May 22, 2025Updated 11 months ago
- ☆38Dec 10, 2024Updated last year
- Collection of browser challenges☆137May 3, 2021Updated 5 years ago
- ☆281Aug 2, 2025Updated 9 months ago
- ☆38Mar 23, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated 2 years ago
- weggli ruleset scanner for source code and binaries☆40Nov 16, 2025Updated 6 months ago
- Linux Kernel N-day Exploit/Analysis.☆64Oct 21, 2024Updated last year
- command control framework☆33May 10, 2026Updated last week
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 5 years ago