quark-engine / quark-script
Collections of Quark Script that detect vulnerabilities in the binaries.
☆18Updated 3 months ago
Alternatives and similar repositories for quark-script
Users that are interested in quark-script are comparing it to the libraries listed below
Sorting:
- Detection Rules for Quark Engine. Please use the website below to explore our rules.☆29Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- This repository contains multiple exploits I have written for various CVEs and CTFs☆25Updated 11 months ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Simple WebSocket fuzzer☆32Updated last year
- A red team emulation tool deveoped by CyCraft Technology☆25Updated last year
- ☆16Updated 10 months ago
- Android Malware Tracker☆27Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- some sploits☆17Updated 7 months ago
- The Dumb Network Fuzzer☆20Updated last year
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- ☆17Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆23Updated 3 months ago
- CVE-2024-53691☆11Updated 4 months ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 3 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 5 months ago
- Decrypt encrypted SonicOSX firmware images☆14Updated 2 months ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆30Updated 3 years ago
- ☆16Updated last year
- ☆17Updated 3 years ago