taviso / avscriptLinks
Avast JavaScript Interactive Shell
☆675Updated 5 years ago
Alternatives and similar repositories for avscript
Users that are interested in avscript are comparing it to the libraries listed below
Sorting:
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆626Updated 5 years ago
- Proof-of-concept for the ZombieLoad attack☆817Updated 3 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,415Updated 6 years ago
- A fast, parallel test case minimization tool.☆971Updated 4 years ago
- The x86 processor fuzzer☆512Updated 6 years ago
- A Pwn2Own exploit chain☆759Updated 6 years ago
- unfork(2) is the inverse of fork(2). sort of.☆1,477Updated last year
- A "living" Linux process with no memory☆351Updated 5 years ago
- ☆470Updated 10 months ago
- RIDL test suite and exploits☆358Updated 5 years ago
- DNS covert channel implant for Red Teams.☆732Updated 5 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 6 years ago
- ☆1,113Updated 4 years ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆869Updated 6 years ago
- TrueType and OpenType font fuzzing toolset☆439Updated 6 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆295Updated 2 months ago
- ☆252Updated 4 years ago
- Interactive CTF Exploration Tool☆1,661Updated 4 years ago
- Utility to find AES keys in running processes☆335Updated 2 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆806Updated 7 months ago
- Proof of Concepts (PE, PDF...)☆1,529Updated 9 months ago
- Interactive shellcoding environment to easily craft shellcodes☆903Updated 4 years ago
- Minimal code to connect to a CEF debugger.☆208Updated 5 years ago
- Here I share the code of my CV, which is also a bootable bootloader :)☆521Updated 6 months ago
- GTRS - Google Translator Reverse Shell☆620Updated last week
- A Javascript library for browser exploitation☆892Updated 6 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆766Updated last year
- A research kernel and hypervisor attempting to get fully deterministic emulation with minimum performance cost☆535Updated 4 years ago
- collection of verified Linux kernel exploits☆189Updated 4 years ago
- Named vulnerabilities and their practical impact☆437Updated 3 years ago