Patching Flash binary to stop Flash exploits and zero-days
☆62Apr 18, 2017Updated 8 years ago
Alternatives and similar repositories for HardenFlash
Users that are interested in HardenFlash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Aug 13, 2015Updated 10 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Sep 3, 2022Updated 3 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin☆148Aug 5, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Hex-Rays Decompiler Enhanced View☆185Sep 21, 2018Updated 7 years ago
- fuzz☆125Jul 18, 2015Updated 10 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Flash ActionScript3 VM static analysis library based on Furnace framework.☆79May 30, 2013Updated 12 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- Tool to resolve symbols by the address of the binary☆15Sep 21, 2018Updated 7 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- A fuzzing library that allows creating malicious payloads based on Joi validator schemas.☆14Apr 20, 2015Updated 10 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26May 13, 2011Updated 14 years ago