Vulnerability Research
Browse 0 cybersecurity solutions, with 0 security professionals searching monthly
FEATURED
AI-powered CVE intelligence platform with exploit data, EPSS, and ATT&CK mappings.
AI-assisted vulnerability research and advanced offensive cyber tooling firm.
AI agent platform for automating offensive security operations and evals.
Automotive-focused threat intelligence platform with dark web monitoring
AI-powered vulnerability discovery and automated patching for open-source code
Whole-system emulation environment for software dev, debugging, testing & security
AI-powered vulnerability intelligence database with real-time threat context
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A collection of Return-Oriented Programming (ROP) challenges designed for practicing binary exploitation techniques and developing offensive security skills.
InternalBlue is a Bluetooth experimentation framework that enables low-level firmware interaction with Broadcom chips for security research and attack prototype development.
OVAA is an intentionally vulnerable Android application that aggregates common platform security vulnerabilities for educational and security testing purposes.
BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.
A collection of security research tools from Google's Project Zero team for testing and analyzing iPhone messaging systems including SMS, iMessage, and IMAP protocols.
A multi-threaded, feedback-driven evolutionary fuzzer that uses low-level process monitoring to discover security vulnerabilities in software applications.
A collection of vulnerable ARM binaries designed for educational exploit development and vulnerability research practice across different architectures and exploitation techniques.