☆22Dec 1, 2025Updated 3 months ago
Alternatives and similar repositories for Blog
Users that are interested in Blog are comparing it to the libraries listed below
Sorting:
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- doesnt work and wont work on it anymore☆10Jul 8, 2024Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆91Mar 4, 2026Updated 2 weeks ago
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Aug 3, 2025Updated 7 months ago
- ☆12Dec 14, 2022Updated 3 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆89Aug 1, 2025Updated 7 months ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆52Aug 27, 2024Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Feb 17, 2025Updated last year
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆81Feb 5, 2025Updated last year
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- Documentation for the Curious Bolt hardware hacking multi-tool☆15Feb 1, 2024Updated 2 years ago
- Integer overflow in FreeType software, which also affects Chrome☆29Aug 27, 2025Updated 6 months ago
- Leveraging economical 40G Mellanox Infiniband NIC☆23Jan 3, 2020Updated 6 years ago
- Mickey's Blogs☆42Feb 12, 2026Updated last month
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆100Jun 20, 2025Updated 9 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- ☆18Mar 22, 2025Updated 11 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆174Nov 11, 2024Updated last year
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆77May 22, 2025Updated 9 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- ☆39Dec 10, 2024Updated last year
- ☆273Aug 2, 2025Updated 7 months ago
- Collection of browser challenges☆140May 3, 2021Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- ☆38Mar 23, 2025Updated 11 months ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- weggli ruleset scanner for source code and binaries☆39Nov 16, 2025Updated 4 months ago
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆13May 22, 2025Updated 9 months ago
- Linux Kernel N-day Exploit/Analysis.☆65Oct 21, 2024Updated last year
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆29Aug 18, 2025Updated 7 months ago
- command control framework☆33Updated this week
- IDA Terminal☆17Feb 27, 2026Updated 3 weeks ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 2 months ago