Collections of patterns for weggli to find nice bugs
☆21Nov 30, 2023Updated 2 years ago
Alternatives and similar repositories for weggli-patterns
Users that are interested in weggli-patterns are comparing it to the libraries listed below
Sorting:
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆18Jun 6, 2024Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆155Jan 14, 2026Updated last month
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- A virtio layer for xv6☆12Apr 16, 2019Updated 6 years ago
- A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.☆17Oct 11, 2023Updated 2 years ago
- ☆32Jun 13, 2023Updated 2 years ago
- linux-exploit☆14Jun 12, 2019Updated 6 years ago
- is a random text generator based on context-free grammars, it uses a EBNF for grammar definitions.☆18May 5, 2025Updated 9 months ago
- ☆15Jul 5, 2020Updated 5 years ago
- ☆27Nov 30, 2024Updated last year
- Webkit JavascriptCore Array unshift function had a race condition, it leads to RCE.☆44Dec 5, 2023Updated 2 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- ☆51Mar 23, 2018Updated 7 years ago
- *For research purposes only*. Some proof of concept code to trig vulnerability or exploit them that I found before.☆25Oct 24, 2025Updated 4 months ago
- LowLevel Jam 0001☆21Mar 20, 2025Updated 11 months ago
- Aims to be interpreted C written in C.☆32May 22, 2025Updated 9 months ago
- ☆31Feb 20, 2022Updated 4 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 2 weeks ago
- weggli ruleset scanner for source code and binaries☆39Nov 16, 2025Updated 3 months ago
- PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)☆72Oct 14, 2021Updated 4 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- autofz: Automated Fuzzer Composition at Runtime☆84Sep 13, 2023Updated 2 years ago
- Shiva is a programmable dynamic linker for loading ELF microprograms☆35Sep 4, 2023Updated 2 years ago
- ☆12Oct 28, 2022Updated 3 years ago
- light ifconfig☆14Apr 13, 2019Updated 6 years ago
- my writeups (mainly pwnable)☆35Sep 22, 2024Updated last year
- ☆272Aug 2, 2025Updated 7 months ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43May 26, 2019Updated 6 years ago
- My Personal Reading lists for CVE Writeups☆38Feb 10, 2022Updated 4 years ago
- ☆12Oct 13, 2022Updated 3 years ago
- A gentle introduction to binary exploitation☆41May 9, 2020Updated 5 years ago
- Constraint solver based on abstract interpretation☆10Dec 20, 2024Updated last year
- ☆15Aug 7, 2025Updated 6 months ago
- A toy LDAP server in C for illustrative purposes☆12Apr 6, 2011Updated 14 years ago
- Greenbone Security Assistant HTTP Server - The server talking to the Greenbone Vulnerability Management daemon (gvmd).☆21Updated this week
- Good code.☆17Nov 18, 2018Updated 7 years ago