spostman / ppp-ccs2018Links
An investigative study on the security and privacy aspects of Progressive Web Apps
☆19Updated 7 years ago
Alternatives and similar repositories for ppp-ccs2018
Users that are interested in ppp-ccs2018 are comparing it to the libraries listed below
Sorting:
- An AFL-inspired genetic fuzz tester for JavaScript☆132Updated 9 months ago
- coverage guided fuzz testing for javascript☆609Updated 4 years ago
- Automatically Preventing Code Injection Attacks on Node.js☆78Updated 3 years ago
- Turbolizer tool from the v8 repository with added support to preload a profile☆180Updated 4 years ago
- X41 Browser Security White Paper - Tools and PoCs☆184Updated 8 years ago
- Demos of and walkthroughs on in-browser fuzzing using WebAssembly☆122Updated 5 years ago
- A fuzzing library in JavaScript. ✨☆117Updated last week
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- ☆242Updated 6 years ago
- See where each character on the screen came from in code.☆539Updated 2 years ago
- Fuzzing Browsers☆313Updated 2 years ago
- Fuzz testing: Beginner's guide☆76Updated last year
- A list of ReDoS vulnerabilities in npm modules found by the Software Lab at TU Darmstadt. For each vulnerability, there is a proof-of-con…☆58Updated 7 years ago
- Vulnerabilities discovered in npm packages [Berkeley PL & Security Research]☆42Updated last year
- Materials from Fuzzing Bay Area meetups☆57Updated 5 years ago
- V8 Tutorial PLDI 2019☆75Updated 6 years ago
- Bug hunting through fuzzer/*-sanitizer/etc...☆133Updated 4 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Updated 6 years ago
- afl-fuzz for javascript☆203Updated 8 years ago
- Official repository containing files related to *ctf 2018☆140Updated 6 years ago
- ☆67Updated 5 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Updated 7 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆142Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- ☆85Updated 5 years ago
- Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secret☆108Updated 7 years ago
- An extended Node.js runtime with additional security mechanisms built-in. Protects your Node.js applications from injection attacks such …☆31Updated 4 years ago
- A zoo for malicious NPM packages☆20Updated 2 years ago
- ☆19Updated 6 years ago
- CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines (NDSS '19)☆241Updated 6 years ago