A Modern Approach
☆10Sep 5, 2015Updated 10 years ago
Alternatives and similar repositories for Smashing_The_Browser_2
Users that are interested in Smashing_The_Browser_2 are comparing it to the libraries listed below
Sorting:
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- fuzz☆125Jul 18, 2015Updated 10 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- exploit development☆49Mar 14, 2018Updated 7 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- A Browser Fuzzer for Vulnerbilities☆66Mar 20, 2015Updated 10 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Sample files for fuzzing ImageMagick☆19May 10, 2017Updated 8 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- ☆26Jan 18, 2026Updated last month
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 14 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Modbus Protocol Fuzzer☆50Oct 4, 2025Updated 5 months ago
- [C#]Main.exe < - > [C_DLL] < - > [C_KERNEL] = Memory_Editor via Kernel☆33Aug 13, 2019Updated 6 years ago
- Unnamed repository; edit this file 'description' to name the repository.☆49Jul 6, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- A fully implemented kernel exploit for the PS4 on 5.05FW☆25May 28, 2018Updated 7 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 2 months ago
- blog☆14Jan 1, 2020Updated 6 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Fuzzing Harness for Firefox Mobile on Android☆40Mar 28, 2019Updated 6 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Extract and generate code based on name and type for mig func/arg/request&reply member etc, ideal helper for creating monitor, tracker, f…☆19Jun 5, 2018Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago