- Seoul, South Korea
-
07:30
(UTC +09:00)
Highlights
Stars
The official Open-Asset-Importer-Library Repository. Loads 40+ 3D-file-formats into one unified and clean data structure.
syzkaller is an unsupervised coverage-guided kernel fuzzer
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. DAF2
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
All Files, Scripts, and exploits can be found here
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
An step by step fuzzing tutorial. A GitHub Security Lab initiative
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution
A collection of links related to Linux kernel security and exploitation
Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries
ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Introduces the Republic of Korea's security documents recommended by CodeEngn.
Educational, CTF-styled labs for individuals interested in Memory Forensics
Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penet…
A repository for learning various heap exploitation techniques.