jvazquez-r7 / CVE-2015-5119
☆12Updated 9 years ago
Alternatives and similar repositories for CVE-2015-5119:
Users that are interested in CVE-2015-5119 are comparing it to the libraries listed below
- ☆9Updated 9 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- ☆33Updated 9 years ago
- ☆19Updated 10 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 10 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 9 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- ☆26Updated 8 years ago
- Windows 8.1 + IE 11 Exploit☆18Updated 8 years ago
- ☆39Updated 3 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 8 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 7 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- Some example source code for fixed IE11 sandbox escapes.☆139Updated 10 years ago
- ☆34Updated 7 years ago
- exploit development☆49Updated 6 years ago
- OpenType font file format fuzzer for Windows☆52Updated 11 years ago
- HitCon 2015 spartan 0day & exploit☆26Updated 9 years ago
- ☆21Updated 9 years ago
- A Modern Approach☆10Updated 9 years ago
- A static Internet Explorer Fuzzer.☆50Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago