Vulnerability Research

Browse 0 cybersecurity solutions, with 0 security professionals searching monthly

AI-powered CVE intelligence platform with exploit data, EPSS, and ATT&CK mappings.

AI-assisted vulnerability research and advanced offensive cyber tooling firm.

AI agent platform for automating offensive security operations and evals.

Automotive-focused threat intelligence platform with dark web monitoring

AI-powered vulnerability discovery and automated patching for open-source code

Whole-system emulation environment for software dev, debugging, testing & security

AI-powered vulnerability intelligence database with real-time threat context

Platform for chip security testing and binary security analysis

A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

A collection of Return-Oriented Programming (ROP) challenges designed for practicing binary exploitation techniques and developing offensive security skills.

InternalBlue is a Bluetooth experimentation framework that enables low-level firmware interaction with Broadcom chips for security research and attack prototype development.

OVAA is an intentionally vulnerable Android application that aggregates common platform security vulnerabilities for educational and security testing purposes.

BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.

A collection of security research tools from Google's Project Zero team for testing and analyzing iPhone messaging systems including SMS, iMessage, and IMAP protocols.

A multi-threaded, feedback-driven evolutionary fuzzer that uses low-level process monitoring to discover security vulnerabilities in software applications.

A collection of vulnerable ARM binaries designed for educational exploit development and vulnerability research practice across different architectures and exploitation techniques.