mikispag / rosettaflash
A tool for manipulating SWF files, leveraging zlib to craft alphanumeric-only valid SWF files in order to allow CSRF with SOP bypass thanks to JSONP abuse.
☆110Updated 10 months ago
Alternatives and similar repositories for rosettaflash:
Users that are interested in rosettaflash are comparing it to the libraries listed below
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Tainted PhantomJS☆53Updated 9 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 9 years ago
- Some example source code for fixed IE11 sandbox escapes.☆139Updated 10 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Updated 5 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- A security tool to fingerprint PNG libraries used by web applications☆80Updated 5 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆161Updated 7 years ago
- ☆35Updated 12 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆39Updated 8 years ago
- ☆46Updated 8 years ago
- Webkit uxss exploit (CVE-2017-7089)☆64Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- some tasks/solutions from CTF challenges☆68Updated 8 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆43Updated 7 years ago
- ☆78Updated 9 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 8 years ago
- Python Web framework P0wner☆75Updated 12 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago