VotiroLabs / Word-Quick-FuzzerLinks
A framework to fuzz Word Quick Fields
☆19Updated 7 years ago
Alternatives and similar repositories for Word-Quick-Fuzzer
Users that are interested in Word-Quick-Fuzzer are comparing it to the libraries listed below
Sorting:
- ☆87Updated 10 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- A MS OpenXML Format Fuzzing Framework☆84Updated 7 years ago
- IDA plugin for software complexity metrics assessment☆60Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Updated 9 years ago
- run AFL with pintool☆66Updated 5 years ago
- Analysis tools and exploit sample scripts for Adobe Reader 10/11 and Acrobat Reader DC☆79Updated 9 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- ☆39Updated 4 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- run AFL with dynamorio☆37Updated 5 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- AFL "mostly" ported to cygwin☆26Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- PoCs for VMWare VGPU Direct 3D 10 vulnerabilities fixed in VMware Workstation 12.5.5 and 12.5.7☆36Updated 8 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆70Updated 8 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Updated 13 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 9 years ago
- haze binary fuzzer☆55Updated last year
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 10 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆91Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Updated 4 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- ☆22Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago