yetingli / PoCsLinks
A list of CVE's with Proof of Concepts
☆11Updated 4 years ago
Alternatives and similar repositories for PoCs
Users that are interested in PoCs are comparing it to the libraries listed below
Sorting:
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆98Updated 2 years ago
- Grammar-based HTTP/2 fuzzer with mutation ability☆47Updated 3 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆104Updated 2 years ago
- CodeQL queries developed by Trail of Bits☆145Updated 3 weeks ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆261Updated last year
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆117Updated 5 months ago
- An automated setup for compiling & fuzzing Apache httpd server☆51Updated 2 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last month
- ☆157Updated 3 years ago
- ☆18Updated 7 years ago
- CodeQL zero to hero blog post series challenges☆163Updated 4 months ago
- ☆90Updated 3 years ago
- Testability Pattern Catalogs for SAST☆31Updated 11 months ago
- ☆98Updated 4 years ago
- A framework for identifying vulnerabilities in VS Code extensions☆19Updated last year
- ☆25Updated 9 months ago
- ☆134Updated 2 months ago
- ☆17Updated 2 years ago
- Security Harness Engineering for Robust Program Analysis☆111Updated 2 weeks ago
- ☆183Updated last year
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆18Updated 2 years ago
- Some research on UXSS vulnerabilities in web browsers☆12Updated 7 years ago
- Reproduce CVEs from ForAllSecure Vulnerabilities Lab☆116Updated last month
- ☆49Updated 5 years ago
- ☆28Updated 3 years ago
- CodeQL workshops for GitHub Universe☆96Updated 3 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆130Updated 2 years ago
- ☆342Updated 4 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆149Updated 2 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago