mboehme / winaflfast
A fork of AFL for fuzzing Windows binaries
☆21Updated 6 years ago
Alternatives and similar repositories for winaflfast:
Users that are interested in winaflfast are comparing it to the libraries listed below
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆59Updated 5 years ago
- ☆44Updated 6 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Updated 11 years ago
- ☆34Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 6 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- A Modern Approach☆10Updated 9 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 6 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆91Updated 3 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- ☆100Updated 6 years ago
- ☆39Updated 3 years ago
- Result files from various fuzzing runs☆16Updated 3 years ago
- Windows 8.1 + IE 11 Exploit☆18Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- ☆33Updated 9 years ago
- Using SEH to bypass CFG☆29Updated 7 years ago
- ☆16Updated 7 years ago