payatu / CVE-2018-14442
PoC for Foxit Reader CVE-2018-14442
☆58Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2018-14442
- ☆44Updated 6 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 5 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆43Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- A fork of AFL for fuzzing Windows binaries☆20Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 6 years ago
- exploit development☆49Updated 6 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆58Updated 5 years ago
- Volatility plugin to extract X screenshots from a memory dump☆36Updated 6 years ago
- Break Apps with Frida workshop material☆43Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- ☆100Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆55Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆88Updated 5 years ago
- 3D Accelerated Exploitation☆54Updated 5 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆84Updated 5 years ago
- ☆39Updated 3 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆27Updated 3 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆91Updated 3 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 7 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Updated 11 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago