XKungFoo-2013
IE vulnerability analysis
Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods
XKungFoo 2013 PPT
6 stars
2 watching
10 forks
last commit: almost 11 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. | 25 |
| A comprehensive guide to bypassing security measures in Chakra browser vulnerabilities | 82 |
| Exploiting Windows 10 x64 edge case on Microsoft Edge browser | 101 |
| Preparation and exploitation research for various web applications | 572 |
| A collection of Python scripts to exploit vulnerabilities in Tencent Cloud services using an AccessKey | 34 |
| Provides examples and explanations of vulnerabilities in web applications | 545 |
| Exploiting vulnerabilities in Microsoft's Spartan memory management system to bypass security features and gain unauthorized access | 26 |
| This project provides a collection of security vulnerabilities discovered in various IoT devices from brands such as Dlink and Tenda. | 22 |
| A toolset for identifying potential security vulnerabilities and patterns in web applications | 1,232 |
| Researchers disclose vulnerabilities in Electron desktop applications and provide proof-of-concept code to help developers fix security issues | 70 |
| Tools for internal network penetration testing and vulnerability assessment | 498 |
| An IDA PRO plugin to analyze binaries for potential vulnerabilities using AI-powered decompilation and static analysis | 353 |
| An open-source project that explores the intersection of machine learning and security to develop tools for detecting vulnerabilities in web applications. | 1,987 |
| Detects and exploits Blind Cross-site scripting (XSS) vulnerabilities to retrieve sensitive information and control user interactions. | 41 |
| A collection of learning resources and case studies to prepare for an Offsec Web Security exam, focusing on vulnerability research and exploitation. | 37 |