Vulnerability detection framework by Binarly's REsearch team
☆779Apr 4, 2026Updated 2 weeks ago
Alternatives and similar repositories for vulhunt
Users that are interested in vulhunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Run TTPs, with AI!☆125Feb 23, 2026Updated last month
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆201Nov 12, 2024Updated last year
- Open KLara Project☆35Feb 12, 2026Updated 2 months ago
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Mar 28, 2026Updated 3 weeks ago
- Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib☆256Apr 9, 2026Updated last week
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- ☆26Nov 24, 2025Updated 4 months ago
- ☆46Oct 10, 2025Updated 6 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆233Apr 12, 2025Updated last year
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 8 months ago
- Example agents for the Dreadnode platform☆31Dec 19, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Remove WPP calls from hexrays decompiled code☆53Jan 31, 2026Updated 2 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆330Oct 20, 2025Updated 5 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Dec 22, 2024Updated last year
- ☆28Mar 14, 2026Updated last month
- ☆14Feb 7, 2023Updated 3 years ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn …☆202Jun 17, 2025Updated 10 months ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- A Model Context Protocol server for IDA☆534May 29, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆99Apr 2, 2025Updated last year
- ☆147Mar 29, 2025Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 5 months ago
- Binary Exploitation Phrack CTF Challenge☆69Aug 21, 2025Updated 7 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- ☆166Feb 29, 2024Updated 2 years ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆86Jun 3, 2024Updated last year
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- ☆12Oct 9, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Windows protocol library, including SMB and RPC implementations, among others.☆712Updated this week
- Integer overflow in FreeType software, which also affects Chrome☆30Aug 27, 2025Updated 7 months ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- Network Fuzzing Framework☆64Jan 17, 2026Updated 3 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆555Oct 3, 2025Updated 6 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated 2 months ago
- Headless Binary Ninja MCP server — giving AI agents deep reverse-engineering capabilities via 180 tools.☆194Mar 4, 2026Updated last month