taviso / avscript
Avast JavaScript Interactive Shell
☆665Updated 4 years ago
Related projects: ⓘ
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆616Updated 4 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,405Updated 5 years ago
- A Pwn2Own exploit chain☆751Updated 5 years ago
- A fast, parallel test case minimization tool.☆941Updated 3 years ago
- Proof-of-concept for the ZombieLoad attack☆812Updated 2 years ago
- Proof of Concepts (PE, PDF...)☆1,436Updated last year
- DNS covert channel implant for Red Teams.☆731Updated 4 years ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆864Updated 5 years ago
- A Javascript library for browser exploitation☆863Updated 5 years ago
- GTRS - Google Translator Reverse Shell☆614Updated last year
- SkySafe Miscellaneous Reverse Engineering Blog☆754Updated 8 months ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 5 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆291Updated last year
- ☆437Updated this week
- Interactive CTF Exploration Tool☆1,640Updated 3 years ago
- unfork(2) is the inverse of fork(2). sort of.☆1,440Updated 4 months ago
- Utility to find AES keys in running processes☆326Updated last year
- The x86 processor fuzzer☆478Updated 5 years ago
- ☆251Updated 3 years ago
- A "living" Linux process with no memory☆337Updated 4 years ago
- Minimal code to connect to a CEF debugger.☆194Updated 4 years ago
- ☆466Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆506Updated 4 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆722Updated last year
- Named vulnerabilities and their practical impact☆430Updated 2 years ago
- GLM uCode dumps☆276Updated 4 years ago
- RIDL test suite and exploits☆351Updated 4 years ago
- ☆753Updated this week
- ☆836Updated this week