Vulnerability detection framework by Binarly's REsearch team
☆739Mar 18, 2026Updated this week
Alternatives and similar repositories for vulhunt
Users that are interested in vulhunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Run TTPs, with AI!☆115Feb 23, 2026Updated last month
- Open KLara Project☆36Feb 12, 2026Updated last month
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Nov 12, 2024Updated last year
- Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib☆254Feb 22, 2026Updated last month
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Mar 16, 2026Updated last week
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- ☆26Nov 24, 2025Updated 4 months ago
- ☆45Oct 10, 2025Updated 5 months ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 7 months ago
- Remove WPP calls from hexrays decompiled code☆56Jan 31, 2026Updated last month
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- ☆28Mar 14, 2026Updated last week
- ☆14Feb 7, 2023Updated 3 years ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- A Model Context Protocol server for IDA☆533May 29, 2025Updated 9 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆230Apr 12, 2025Updated 11 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 4 months ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆87Jun 3, 2024Updated last year
- Headless Binary Ninja MCP server — giving AI agents deep reverse-engineering capabilities via 180 tools.☆164Mar 4, 2026Updated 2 weeks ago
- ☆168Feb 29, 2024Updated 2 years ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- ☆12Oct 9, 2020Updated 5 years ago
- Windows protocol library, including SMB and RPC implementations, among others.☆688Mar 9, 2026Updated 2 weeks ago
- Integer overflow in FreeType software, which also affects Chrome☆29Aug 27, 2025Updated 6 months ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆508Oct 3, 2025Updated 5 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆326Oct 20, 2025Updated 5 months ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated 2 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated last month
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆129Jul 5, 2024Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Dec 22, 2024Updated last year
- ☆34Apr 14, 2025Updated 11 months ago
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆128Updated this week
- ☆23Mar 6, 2023Updated 3 years ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆200Jun 17, 2025Updated 9 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month