CERTCC / dranzer
Dranzer is a tool that enables users to examine effective techniques for fuzz testing ActiveX controls
☆32Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for dranzer
- ☆44Updated 6 years ago
- ☆32Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- ☆41Updated 6 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 7 years ago
- ☆39Updated 3 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆53Updated 7 years ago
- ☆33Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 7 years ago
- ☆22Updated 7 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 7 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- Using SEH to bypass CFG☆28Updated 7 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- ☆34Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)☆14Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆36Updated 6 years ago
- ☆51Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 7 years ago
- ☆41Updated 6 years ago
- ☆10Updated 2 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 6 years ago