Smashing The Browser: From Vulnerability Discovery To Exploit
☆448Jul 18, 2015Updated 10 years ago
Alternatives and similar repositories for Smashing_The_Browser
Users that are interested in Smashing_The_Browser are comparing it to the libraries listed below
Sorting:
- fuzz☆125Jul 18, 2015Updated 10 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Grinder is a system to automate the fuzzing of web browsers and the management of a large number of crashes.☆418Aug 27, 2022Updated 3 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- afl-fuzz for javascript☆203Feb 11, 2017Updated 9 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,316Sep 3, 2019Updated 6 years ago
- A distributed fuzzing testing suite with web administration☆374Jan 14, 2019Updated 7 years ago
- Visualization of heap operations.☆617Dec 5, 2024Updated last year
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- ☆567May 30, 2018Updated 7 years ago
- Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.☆1,299Jun 29, 2023Updated 2 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆522May 23, 2025Updated 9 months ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- A Javascript library for browser exploitation☆894Feb 12, 2019Updated 7 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- Semantic Binary Code Analysis Framework☆124Sep 28, 2015Updated 10 years ago
- DOM fuzzer☆1,769Nov 26, 2024Updated last year
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago
- Some helpful preload libraries for pwning stuff.☆1,646May 22, 2025Updated 9 months ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- A tool to help you write binary exploits☆610Feb 21, 2019Updated 7 years ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- Wadi Fuzzing Harness☆127Feb 6, 2017Updated 9 years ago
- My proof-of-concept exploits for the Linux kernel☆1,563Sep 11, 2025Updated 5 months ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325May 9, 2016Updated 9 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 4 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago