*For research purposes only*. Some proof of concept code to trig vulnerability or exploit them that I found before.
☆25Oct 24, 2025Updated 4 months ago
Alternatives and similar repositories for vulnerability
Users that are interested in vulnerability are comparing it to the libraries listed below
Sorting:
- 'SWEETMON' is a fuzzer monitoring service based python3 + django. User can check their fuzzers and crashes on the web. It can reduce repe…☆17Jun 5, 2020Updated 5 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Totally legitimate☆11May 15, 2019Updated 6 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- Collections of patterns for weggli to find nice bugs☆21Nov 30, 2023Updated 2 years ago
- defcon framework by SeoulPlusBadass☆18Dec 11, 2022Updated 3 years ago
- Java class name obfuscation via classloader segregation and graph colouring☆18Jul 4, 2017Updated 8 years ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- Engine for collecting onion domains and crawling from webpage based on Tor network☆14Dec 8, 2022Updated 3 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- The Operating System on x86_64 Architecture☆15Mar 3, 2021Updated 4 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- useful crypto resources for CTF competition.☆19Mar 2, 2019Updated 6 years ago
- ☆27Jan 8, 2022Updated 4 years ago
- IDA script for vmprotect Windows Api address decoder☆54Jun 8, 2021Updated 4 years ago
- Android malware static & dynamic analysis and automated action (deprecated)☆21May 18, 2021Updated 4 years ago
- Some presentations I did in the past☆65Apr 17, 2023Updated 2 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 2 weeks ago
- ☆60Oct 25, 2020Updated 5 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- check if device contains Pegasus Spyware files☆40Aug 30, 2016Updated 9 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆84Jun 1, 2022Updated 3 years ago
- A simple tool to find offsets needed in 32bit jailbreaks. Feel free to contribute.☆31Sep 1, 2017Updated 8 years ago
- My Personal Reading lists for CVE Writeups☆38Feb 10, 2022Updated 4 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- 본 프로젝트는 KITRI BoB(Best of the Best) 10기에서 진행한 프로젝트로, 드론에 대한 취약성 연구를 진행한 내용을 기록하였습니다.☆40Jan 5, 2022Updated 4 years ago
- windows utility code☆88Updated this week
- ☆12Jul 7, 2014Updated 11 years ago
- 4chan Information Library☆10Oct 11, 2013Updated 12 years ago
- Good code.☆17Nov 18, 2018Updated 7 years ago
- 딥러닝을 이용한 3쿠션 힌트 안드로이드앱(3-Cushion Hint with Deep Learning)☆13Jun 2, 2021Updated 4 years ago
- 두물머리의 새 동료를 찾습니다.☆14Jan 18, 2019Updated 7 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago