A Modern Approach
☆10Sep 5, 2015Updated 10 years ago
Alternatives and similar repositories for Smashing_The_Browser_2
Users that are interested in Smashing_The_Browser_2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- fuzz☆125Jul 18, 2015Updated 10 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- exploit development☆49Mar 14, 2018Updated 8 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- A Browser Fuzzer for Vulnerbilities☆66Mar 20, 2015Updated 11 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- A fully implemented kernel exploit for the PS4 on 5.05FW☆25May 28, 2018Updated 7 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 14 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- Sample files for fuzzing ImageMagick☆19May 10, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 3 months ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- ☆26Jan 18, 2026Updated 2 months ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- ☆16Jul 30, 2020Updated 5 years ago
- Unnamed repository; edit this file 'description' to name the repository.☆49Jul 6, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Extract and generate code based on name and type for mig func/arg/request&reply member etc, ideal helper for creating monitor, tracker, f…☆19Jun 5, 2018Updated 7 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- ☆27Oct 21, 2016Updated 9 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago