Starred repositories
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js
Extract files from any kind of container formats
🔨 Break Java Reverse Engineering form Memory World!
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Convert shellcode into ✨ different ✨ formats!
Fuzzware's main repository. Start here to install.
Framework for Automating Fuzzable Target Discovery with Static Analysis.
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-m…
x86 PC emulator and x86-to-wasm JIT, running in the browser
Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.
BinAbsInspector: Vulnerability Scanner for Binaries
Tai-e assignments for static program analysis
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Allows you to partly emulate an Android native library.
ROP userland execution for PS5 (4.03)
Allows you to emulate an Android native library, and an experimental iOS emulation
Fugu14 is an untethered iOS 14.3-14.5.1 jailbreak
Tools that can be used to interact with the KeyWe Smart Lock device.
the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy lea…
Headless Android x86 emulator ready for automated instrumentation testing.