Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis
☆28May 22, 2016Updated 9 years ago
Alternatives and similar repositories for attacking-browser-extensions
Users that are interested in attacking-browser-extensions are comparing it to the libraries listed below
Sorting:
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- libfuzzerfication - fuzzing for the rest of us!☆61Jan 9, 2017Updated 9 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- TrueType Font Fuzzer☆53Nov 6, 2015Updated 10 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- ☆26Jan 18, 2026Updated last month
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 14 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Python implementation of zzuf mutator - little bit-flip atomic bomb☆71Nov 15, 2016Updated 9 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Unnamed repository; edit this file 'description' to name the repository.☆49Jul 6, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Oct 11, 2017Updated 8 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- ☆73Oct 15, 2014Updated 11 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago