VulnerabilityHistoryProject / chromium-vulnerabilities
Data for vulnerabilityhistory.org
☆27Updated last year
Related projects ⓘ
Alternatives and complementary repositories for chromium-vulnerabilities
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 6 years ago
- ☆8Updated 4 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 6 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- ☆36Updated 5 years ago
- This repository is for binaries that are currently being worked on to be solved by angr.☆11Updated 7 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- A tool to triage screenshots☆19Updated 7 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 5 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Updated 8 years ago
- Tools to work with vulnerability standards.☆19Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- quals-2014☆22Updated 10 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- ☆20Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆20Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- pure Python binary analysis framework☆22Updated 6 years ago
- Break Apps with Frida workshop material☆43Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago