Security advisories + PoCs from Google.
Tools for research
Vulnerability and malware research.
166 tools indexed
Open-source phishing toolkit.
HELK
—The Hunting ELK stack.
Modern, malleable C2 framework.
Open-source HTTP toolkit for sec research.
MCP bridge between IDA Pro and LLMs.
Hex editor for reverse engineers.
Manage threat intel at scale.
JADX
—Dex-to-Java decompiler.
Standalone Java decompiler GUI.
Coverage-guided fuzzer (Win/macOS/Linux/Android).
Java decompiler and assembler.
Curated kernel privesc exploit database.
MISP
—Threat intelligence sharing platform.
Automated adversary emulation.
Microsoft Threat Intelligence in Python.
Username OSINT across 3000+ sites.
iOS and macOS decompiler.
Graph-based OSINT and link analysis.
Symbolic execution for binaries and smart contracts.
Mass IP port scanner.
Memory forensics as a filesystem.
Exploit development and delivery platform.
Multi-platform C2 framework.