debasishm89 / IEFuzzView external linksLinks
A static Internet Explorer Fuzzer.
☆50Jun 15, 2017Updated 8 years ago
Alternatives and similar repositories for IEFuzz
Users that are interested in IEFuzz are comparing it to the libraries listed below
Sorting:
- TrueType Font Fuzzer☆53Nov 6, 2015Updated 10 years ago
- A Browser Fuzzer for Vulnerbilities☆66Mar 20, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- fuzz☆124Jul 18, 2015Updated 10 years ago
- A web page based fuzzer that generates random JS statements then fuzz in the web-browser.☆60May 6, 2019Updated 6 years ago
- Wadi Fuzzing Harness☆127Feb 6, 2017Updated 9 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Apr 16, 2014Updated 11 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆49Feb 16, 2016Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- afl-fuzz for javascript☆203Feb 11, 2017Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆106Jul 26, 2016Updated 9 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- INACTIVE - http://mzl.la/ghe-archive - Fuzzing Harness for Firefox Mobile on Android☆40Mar 28, 2019Updated 6 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- Analysis tools and exploit sample scripts for Adobe Reader 10/11 and Acrobat Reader DC☆79May 28, 2016Updated 9 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago