This tool calculates tricky canonical huffman histogram for CVE-2023-4863.
☆26Dec 20, 2023Updated 2 years ago
Alternatives and similar repositories for NotEnough
Users that are interested in NotEnough are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- ☆25Sep 27, 2023Updated 2 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- ☆58Jan 29, 2024Updated 2 years ago
- ☆65Aug 15, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- ☆41Jan 26, 2024Updated 2 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆22Aug 9, 2022Updated 3 years ago
- ☆30Nov 25, 2025Updated 4 months ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 10 months ago
- ☆70Jul 6, 2023Updated 2 years ago
- Tango: Extracting Higher-Order Feedback through State Inference☆17Aug 8, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A CPU Backdoor. Phrack 72☆15Dec 4, 2025Updated 4 months ago
- A curated list of awesome baseband research resources☆16Sep 8, 2019Updated 6 years ago
- ☆15Nov 3, 2023Updated 2 years ago
- Efficient C implementation of Differential Fault Analysis on AES (round 8 or 9)☆32Jan 4, 2025Updated last year
- For V8CTF M122☆14Aug 25, 2024Updated last year
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆19Mar 18, 2019Updated 7 years ago
- ☆44Aug 8, 2022Updated 3 years ago
- ☆318Dec 18, 2023Updated 2 years ago
- A toy Fuzzer for wasm fuzzing based on fuzzilli☆72Apr 8, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆38Apr 5, 2024Updated 2 years ago
- Research related☆89Apr 5, 2022Updated 4 years ago
- ☆152Feb 20, 2023Updated 3 years ago
- ☆38Nov 29, 2022Updated 3 years ago
- ☆56Aug 26, 2022Updated 3 years ago
- VM Escape for Parallels Desktop <18.1.1☆172Mar 15, 2024Updated 2 years ago
- Make XSS Great Again☆31Nov 29, 2019Updated 6 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆18Jan 23, 2025Updated last year
- Linux Debugger Prototype☆44Feb 12, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 5 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆25Mar 6, 2023Updated 3 years ago
- my exp for CVE-2020-27194, tested on linux kernel 5.8.14.☆15Feb 3, 2021Updated 5 years ago
- Safari 1day RCE Exploit☆160Mar 22, 2025Updated last year
- ☆23Nov 5, 2021Updated 4 years ago
- A collection of various exploits☆29Sep 17, 2024Updated last year