bestshow / p0cs
☆14Updated 5 years ago
Alternatives and similar repositories for p0cs:
Users that are interested in p0cs are comparing it to the libraries listed below
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆45Updated 8 years ago
- ☆82Updated 6 years ago
- riufuzz —— honggfuzz modifited version by riusksk, better support for windows (cdb symbols) and macOS, and more colorful UI☆132Updated 5 years ago
- pocs of tested targets☆20Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆57Updated 5 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆100Updated 5 years ago
- ☆67Updated 4 years ago
- OSS-Fuzz - integrated with AFLGo for Patch Testing☆35Updated 7 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Corpus set used by DIE☆40Updated 4 years ago
- cve2014-3153 exploit for ubuntu x86☆17Updated 10 years ago
- A new type of js fuzzer☆26Updated 5 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 6 years ago
- A web page based fuzzer that generates random JS statements then fuzz in the web-browser.☆60Updated 5 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Updated 3 years ago
- ☆86Updated 5 years ago
- A generated corpus, seed, and target for a fuzz job☆59Updated 9 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆47Updated 8 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆80Updated 6 years ago
- A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz)☆92Updated 7 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- Heap exploitation technique bypassing heap ASLR☆46Updated 5 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆92Updated 7 years ago
- Fuzz testing on JavaScriptCore and WebAssembly in WebKit☆5Updated 5 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆81Updated 8 years ago
- My Material for the HITB presentation☆35Updated 4 years ago
- ☆53Updated 6 years ago