VulnerabilityHistoryProject / chromium-vulnerabilitiesLinks
Data for vulnerabilityhistory.org
☆28Updated 3 years ago
Alternatives and similar repositories for chromium-vulnerabilities
Users that are interested in chromium-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Memory inspection REPL interface☆45Updated 8 years ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Updated 9 years ago
- r2yara - Module for Yara using radare2 information☆35Updated 2 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Updated 13 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- An Extensible Dynamic Analysis Framework for IoT Devices☆21Updated 7 years ago
- ☆45Updated 7 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆45Updated 2 years ago
- ☆43Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Fuzzer☆43Updated 11 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 9 years ago
- A fuzz job for ClamAV☆32Updated 9 years ago
- ☆22Updated 7 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 10 years ago
- Collection of modified open fuzzer.☆30Updated 13 years ago
- Simple reporting plugin for binary ninja☆16Updated 7 years ago
- Reverse Engineering tool for Ethereum EVM☆20Updated 9 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- BinCrowd Plugin for IDA Pro☆44Updated 14 years ago
- Exploit code for CVE-2016-9066☆45Updated 8 years ago
- ELF header abuse☆50Updated 9 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Updated 9 years ago