Portcullis Computer Security Co-ordinated Disclosure Toolkit
☆24May 10, 2025Updated 9 months ago
Alternatives and similar repositories for co-ordinated-disclosure-toolkit
Users that are interested in co-ordinated-disclosure-toolkit are comparing it to the libraries listed below
Sorting:
- cloud-based interactive security exercises☆14Jul 13, 2020Updated 5 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- ☆15Apr 5, 2016Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- ☆166Apr 25, 2017Updated 8 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Jun 26, 2018Updated 7 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis☆28May 22, 2016Updated 9 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆19Oct 16, 2024Updated last year
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆77Jan 24, 2016Updated 10 years ago
- Security Payload Unit Test Repository (SPUTR)☆87Feb 18, 2026Updated 2 weeks ago
- ☆15Oct 27, 2015Updated 10 years ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 8 months ago
- ☆12Feb 23, 2015Updated 11 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- A collection of high-performance, modular utilities for enhancing testing, transactional consistency, efficiency, security and stability …☆28Jan 26, 2026Updated last month
- Symbolic range analysis for LLVM.☆12Jan 10, 2016Updated 10 years ago