Lists (5)
Sort Name ascending (A-Z)
Stars
- All languages
- ActionScript
- ApacheConf
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Dockerfile
- Faust
- Go
- HTML
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- MATLAB
- Makefile
- Max
- Nim
- PHP
- PowerShell
- Python
- QMake
- Rich Text Format
- Roff
- Ruby
- Rust
- Shell
- Smali
- Solidity
- Swift
- SystemVerilog
- TeX
- TypeScript
- VBScript
- Vim Script
- Vue
- XSLT
- YARA
A Framework for fuzzing USB Drivers by Device Emulation
[CVPR 2025] VGGT: Visual Geometry Grounded Transformer
Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow
The dataset for drone based detection and tracking is released, including both image/video, and annotations.
A fuzzing platform for Zigbee protocol implementations
Fuzzware's main repository. Start here to install.
Efficient Network Traffic Classification via Pre-training Unidirectional Mamba
List the real world programs evaluated in fuzzing papers.
LeoneChen / EnclaveFuzz
Forked from vul337/EnclaveFuzzCode of paper "EnclaveFuzz: Finding Vulnerabilities in SGX Applications"
Hey folks, this is a repository for papers on LLM for Vuln. Detection area
Hydra: an Extensible Fuzzing Framework for Finding Semantic Bugs in File Systems
Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)
One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning
My browser pwn collections. Mainly JavaScript engine stuff.
awesome list of browser exploitation tutorials
A high-performance distributed file system designed to address the challenges of AI training and inference workloads.
MemoryModule which compatible with Win32 API and support exception handling
POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY
CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious shortcuts.