To contribute your work to the project you need to create a pull request on the Github where it is hosted.
The pull request should contain all needed information – such as an exploit itself, exploit prerequisites, exploit YAML profile if needed hardware profile, hardware prerequisites and if possible needed hardware verification code.
The pull request would be inspected for possible malicious actions and then merged and added to the installation VM.
There are 5 possible codes for non-DoS exploits:
These codes translate into the following wrapper functions that you can import into your exploit code or wrapper:
from bluekit.report import report_vulnerable, report_not_vulnerable, report_error, report_undefined, report_none_of_4_state_observed
In all functions “data” argument represents the data that would appear in the report and logs.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…