This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.
-
Updated
Aug 4, 2021 - C
This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.
Greenbone Vulnerability Management Libraries
SMB module for OpenVAS Scanner
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
A github action to perform C/C++ security checks automatically
CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dynamic program execution traces.
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
A faster version of AFL-Fuzz used for DARPA Cyber Grand Challenge with optimized scheduler code
network vulnerability-test engine nasl like script engine
PHP Open Iast Agent
LFIvader Um scanner avançado para detecção de vulnerabilidades do tipo Local File Inclusion (LFI). Desenvolvido em C, o LFIvader combina eficiência e precisão para identificar falhas em servidores web, apresentando resultados organizados e salvos automaticamente para análise detalhada. 🚀
Source code for our tool OSS-Builder, that builds a training dataset for learning-based vulnerability discovery based on [OSS-fuzz](https://github.com/google/oss-fuzz). It uses CodeQL to find the changed function before and after a fix and annotates the function with extra context from the repository, such as the values of known constants, possi...
Reimplement empirical study on deep learning-based vulnerability detection techniques using real-world datasets (Devign and Chrome+Debian). Includes tools for parsing, slicing, and analyzing C code with GGNN and ReVeal pipelines.
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
A WinDbg plugin that records all NtDeviceIoControlFile() and DeviceIoControl() calls across processes, capturing process details, device ACLs, and stack unwind information to identify vulnerable IOCTL interactions with kernel drivers.
A C project made as a part of the Secure Programming with C course (UE18CS257C) course at PES University. The objective of the project was to display the effects of integer overflows in the C programming language the necessary steps required to prevent such errors in product development.
Add a description, image, and links to the vulnerability-detection topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-detection topic, visit your repo's landing page and select "manage topics."