Exploit Firefox Vulnerability
☆24May 25, 2020Updated 5 years ago
Alternatives and similar repositories for Firefox-Exploitation
Users that are interested in Firefox-Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 7 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 7 years ago
- ☆17May 13, 2019Updated 6 years ago
- Superion Mutator for AFLPlusPlus☆31Dec 5, 2023Updated 2 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- ☆105Dec 9, 2019Updated 6 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆58Jan 15, 2025Updated last year
- ☆23Nov 5, 2021Updated 4 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆162Oct 28, 2019Updated 6 years ago
- ☆95Apr 2, 2019Updated 6 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- Some exploits to bypass Safer Mode in Ghostscript☆18Oct 24, 2020Updated 5 years ago
- PoC exploit for CVE-2016-4622☆109Sep 18, 2023Updated 2 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 10 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- ☆82Nov 17, 2022Updated 3 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- Research related☆89Apr 5, 2022Updated 3 years ago
- GDB Python scripts targetting Fennec development☆22Jan 19, 2018Updated 8 years ago
- ☆31Jul 5, 2020Updated 5 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆124Jul 7, 2022Updated 3 years ago
- ☆16Jun 23, 2024Updated last year
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- Grey-box Concolic Testing on Binary Code (ICSE '19)☆156Oct 4, 2021Updated 4 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago