Stars
A Flexible Framework for Experiencing Heterogeneous LLM Inference/Fine-tune Optimizations
[ACL 2025] Graph Aligned Large Language Models for Improved Source Code Understanding
Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.
An interactive list of plugins for hex-rays' IDA Pro
A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
[TMLR] A curated list of language modeling researches for code (and other software engineering activities), plus related datasets.
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability
(持续更新)本项目为存储团队Bot小K每日监测到的最新POC,EXP,以及自己平时总结的POC,为了方便渗透测试过程中,漏洞查询,脱网环境的渗透测试。
一个漏洞 PoC 知识库。A knowledge base for vulnerability PoCs(Proof of Concept), with 1k+ vulnerabilities.
A Security Tool for Bug Bounty, Pentest and Red Teaming.
emadshanab / goby-poc
Forked from D-Haiming/gobypocThis repository comes from an Internet collection
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
A list of Reverse Engineering articles, books, and papers
A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.