Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
-
Updated
Aug 15, 2025 - C
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.
Greenbone Vulnerability Management Libraries
SMB module for OpenVAS Scanner
A github action to perform C/C++ security checks automatically
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dynamic program execution traces.
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
A faster version of AFL-Fuzz used for DARPA Cyber Grand Challenge with optimized scheduler code
network vulnerability-test engine nasl like script engine
PHP Open Iast Agent
LFIvader Um scanner avançado para detecção de vulnerabilidades do tipo Local File Inclusion (LFI). Desenvolvido em C, o LFIvader combina eficiência e precisão para identificar falhas em servidores web, apresentando resultados organizados e salvos automaticamente para análise detalhada. 🚀
A WinDbg plugin that records all NtDeviceIoControlFile() and DeviceIoControl() calls across processes, capturing process details, device ACLs, and stack unwind information to identify vulnerable IOCTL interactions with kernel drivers.
Source code for our tool OSS-Builder, that builds a training dataset for learning-based vulnerability discovery based on [OSS-fuzz](https://github.com/google/oss-fuzz). It uses CodeQL to find the changed function before and after a fix and annotates the function with extra context from the repository, such as the values of known constants, possi...
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Reimplement empirical study on deep learning-based vulnerability detection techniques using real-world datasets (Devign and Chrome+Debian). Includes tools for parsing, slicing, and analyzing C code with GGNN and ReVeal pipelines.
A C project made as a part of the Secure Programming with C course (UE18CS257C) course at PES University. The objective of the project was to display the effects of integer overflows in the C programming language the necessary steps required to prevent such errors in product development.
Add a description, image, and links to the vulnerability-detection topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-detection topic, visit your repo's landing page and select "manage topics."