☆12Aug 4, 2015Updated 10 years ago
Alternatives and similar repositories for CVE-2015-5119
Users that are interested in CVE-2015-5119 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Aug 13, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- Flash ActionScript3 VM static analysis library based on Furnace framework.☆79May 30, 2013Updated 12 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Anti-technique Codes, Detection of Anti-technique codes☆38Oct 27, 2013Updated 12 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin☆148Aug 5, 2014Updated 11 years ago
- Universal Plug and Fuzz☆41Sep 16, 2019Updated 6 years ago
- ☆15Nov 23, 2015Updated 10 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Concurrent network scanner for CVE-2015-1635☆10Dec 7, 2017Updated 8 years ago
- ☆24Mar 3, 2020Updated 6 years ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- A collection of SolarWinds SWQL examples☆10Mar 18, 2021Updated 5 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Source code for the Actionscript virtual machine☆208Dec 3, 2013Updated 12 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- windows create process with a dll load first time via LdrHook☆31Oct 21, 2016Updated 9 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- A pure Ruby library for parsing the XML out of an AndroidManifest.xml stored in an APK package☆16Aug 5, 2016Updated 9 years ago
- Experiments related to CVE-2015-3456☆12May 27, 2015Updated 10 years ago
- PoC implementation of the POODLE attack☆69May 13, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 11 years ago