☆22Dec 1, 2025Updated 2 months ago
Alternatives and similar repositories for Blog
Users that are interested in Blog are comparing it to the libraries listed below
Sorting:
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Aug 3, 2025Updated 6 months ago
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆90Nov 13, 2025Updated 3 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆52Aug 27, 2024Updated last year
- Modular and extensible library for Virtual Machine Introspection☆117Updated this week
- Aplos an extremely simple fuzzer for Windows binaries.☆68Feb 17, 2025Updated last year
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆77May 22, 2025Updated 9 months ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- Custom Agent and Tooling for using Nyx with Firefox☆21Jul 23, 2025Updated 7 months ago
- ☆19Nov 19, 2024Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆88Aug 1, 2025Updated 6 months ago
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- command control framework☆32Updated this week
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- ULPatch is open source user space live patch tool.☆13Jan 11, 2026Updated last month
- User friendly ways to parse small code snippets into data types in Ghidra.☆33Feb 15, 2026Updated last week
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- ☆36Mar 23, 2025Updated 11 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Collection of browser challenges☆140May 3, 2021Updated 4 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆172Nov 11, 2024Updated last year
- ☆272Aug 2, 2025Updated 6 months ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- A Mythic Agent written in PIC C.☆207Feb 4, 2025Updated last year
- Linux Kernel N-day Exploit/Analysis.☆65Oct 21, 2024Updated last year
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 3 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆99Jun 20, 2025Updated 8 months ago
- UAC Bypass using CMSTP in Rust☆35Dec 6, 2024Updated last year
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆93Jan 21, 2026Updated last month
- weggli ruleset scanner for source code and binaries☆39Nov 16, 2025Updated 3 months ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆33Feb 16, 2026Updated last week