votd / vulnerability-of-the-dayLinks
A pedagogically-curated collection of vulnerability demonstrations for undergraduate software engineering students.
☆65Updated last year
Alternatives and similar repositories for vulnerability-of-the-day
Users that are interested in vulnerability-of-the-day are comparing it to the libraries listed below
Sorting:
- Simple Fuzzer is a simple config-file driven block/mutation based fuzzing system☆66Updated last year
- a grammar-based data generator☆60Updated 6 years ago
- GDB commands to aid exploit development☆45Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 9 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 8 years ago
- Challenges where you can practice heap tecnics☆23Updated 7 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- ☆26Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- Format string exploitation helper☆45Updated 9 years ago
- Code to fuzz bignum libraries☆46Updated 6 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- Advanced buffer overflow and memory corruption security challenges☆189Updated 3 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆97Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- ☆20Updated 7 years ago
- Sample application to let OpenSSL talk to itself (for fuzzing)☆34Updated 9 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Updated 4 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 9 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 5 years ago
- Our backup exploitation technique: fuzzing for POVs!☆23Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Fuzzing results for various interpreters.☆82Updated 7 years ago
- PoC for CVE-2015-6086☆68Updated 9 years ago
- Recent Fuzzing Paper☆35Updated 2 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago