Cellule / wasm-exprgenLinks
Expression generator for WebAssembly
☆18Updated 7 years ago
Alternatives and similar repositories for wasm-exprgen
Users that are interested in wasm-exprgen are comparing it to the libraries listed below
Sorting:
- ☆31Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Updated 8 years ago
- Slides of 44Con 2018☆22Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆57Updated 8 years ago
- ☆14Updated 10 years ago
- Crappy Win32k syscall fuzzer☆13Updated 10 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Updated 8 years ago
- Using SEH to bypass CFG☆30Updated 8 years ago
- ☆22Updated 8 years ago
- Microsoft Edge MemGC Internals☆17Updated 10 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Updated 8 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- S2E plugins library☆17Updated 5 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 7 years ago
- DbgFlashVul☆12Updated 10 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Updated 13 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Updated 8 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Updated 11 years ago
- ☆10Updated 10 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- ☆34Updated 8 years ago
- A static Internet Explorer Fuzzer.☆50Updated 8 years ago
- ☆63Updated 8 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 10 years ago
- exploit development☆49Updated 7 years ago
- WinEoP Exploitation Framework☆25Updated 9 years ago