Damn_Vulnerable_C_Program
Vulnerability demo
An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools.
An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.
681 stars
15 watching
143 forks
Language: Rust
last commit: about 1 year ago afldynamoriofuzzinghonggfuzzjackalopelibafllibfuzzersecuritytinyinstvulnerabilitiesvulnerabilitywinafl
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A DeFi protocol with intentional vulnerabilities for testing and learning secure smart contract development | 25 |
| | A collection of DeFi challenges with intentionally introduced vulnerabilities to simulate real-world security issues in Ethereum-based smart contracts. | 675 |
| | An application showcasing vulnerabilities in a CICS system | 21 |
| | A deliberately insecure PHP application showcasing common web security vulnerabilities. | 7 |
| | Records reproductions of Linux vulnerabilities in various virtual machines. | 399 |
| | A DeFi smart contract training tool that simulates real-world vulnerabilities to help developers learn offensive security testing skills | 495 |
| | A collection of tools and methodologies for identifying vulnerabilities in web applications | 3,698 |
| | A collection of Rust libraries for working with vulnerability data from various sources. | 17 |
| | An in-depth exploration of browser exploitation techniques and vulnerability discovery | 446 |
| | Demonstrates security vulnerabilities in the Linux kernel's eBPF system | 556 |
| | A proof-of-concept demonstrating the vulnerability of unsecured containers to privilege escalation attacks | 12 |
| | A collection of proof-of-concept exploits for specific software vulnerabilities | 675 |
| | A collection of grep commands to help find potentially vulnerable PHP code | 348 |
| | A test application to demonstrate common security vulnerabilities in an Android app | 19 |
| | A simple Rust-based tool for testing software vulnerabilities by generating random inputs | 23 |