Stars
Automated Benchmarking of LLM Agents on Real-World Software Security Tasks [NeurIPS 2025]
SymCC: efficient compiler-based symbolic execution
Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Autonomous Security Analysis and Penetration Testing
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-…
Keystone Enclave (QEMU + HiFive Unleashed)
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
iblessing is an iOS security exploiting toolkit, it mainly includes application information gathering, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis …
A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Windows 10 UAC bypass for all executable files which are autoelevate true .
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
A collection of out-of-tree LLVM passes for teaching and learning
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints
PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap
Open-source code analysis platform for C/C++/Java/Binary/Javascript/Python/Kotlin based on code property graphs. Discord https://discord.gg/vv4MH284Hc
Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code
PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.
NINA: No Injection, No Allocation x64 Process Injection Technique
Emulation and Feedback Fuzzing of Firmware with Memory Sanitization