jduck / VulnWebView
☆43Updated 10 years ago
Alternatives and similar repositories for VulnWebView:
Users that are interested in VulnWebView are comparing it to the libraries listed below
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- ☆19Updated 10 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆27Updated 4 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆39Updated 8 years ago
- ☆23Updated 9 years ago
- A Browser Fuzzer for Vulnerbilities☆65Updated 9 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- ☆38Updated 8 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- Windows 8.1 + IE 11 Exploit☆18Updated 8 years ago
- slide and full exploit☆86Updated 4 years ago
- ☆31Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- Presentations☆11Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆8Updated 10 years ago
- Exploit collection for NT privilege escalation☆66Updated 9 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- ☆45Updated 7 years ago