Loading...
Browse 28 vulnerability research tools
AI-assisted vulnerability research and advanced offensive cyber tooling firm.
AI agent platform for automating offensive security operations and evals.
Automotive-focused threat intelligence platform with dark web monitoring
AI-powered vulnerability discovery and automated patching for open-source code
Whole-system emulation environment for software dev, debugging, testing & security
Security research lab publishing vulnerability analyses and exploit research
Advanced penetration testing methodology for comprehensive security assessments
Secure development lifecycle consulting for hardware, software & IoT products
AI-powered vulnerability intelligence database with real-time threat context
Adversary-informed cybersecurity innovation engine for nation-state threats
Open source vulnerability intelligence engine analyzing 270M+ components
Platform for chip security testing and binary security analysis
A visual guide that maps attack vectors and exploitation techniques for identifying vulnerabilities in GitHub Actions configurations and CI/CD pipelines.
InternalBlue is a Bluetooth experimentation framework that enables low-level firmware interaction with Broadcom chips for security research and attack prototype development.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A collection of Return-Oriented Programming (ROP) challenges designed for practicing binary exploitation techniques and developing offensive security skills.
OVAA is an intentionally vulnerable Android application that aggregates common platform security vulnerabilities for educational and security testing purposes.
A collection of security research tools from Google's Project Zero team for testing and analyzing iPhone messaging systems including SMS, iMessage, and IMAP protocols.
A collection of vulnerable ARM binaries designed for educational exploit development and vulnerability research practice across different architectures and exploitation techniques.
Educational repository containing RPISEC's course materials for teaching modern binary exploitation, vulnerability research, and reverse engineering at Rensselaer Polytechnic Institute.
A standard for conducting penetration tests, covering seven main sections from planning to reporting.
BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.
Get strategic cybersecurity insights in your inbox