Hacking browser components by Reverse Engineering is emerging as the best way for discovering potential vulnerabilities across web applications in an era of Rich Internet Applications (RIA). The RIA space is flooded with technologies like HTML 5, Flex/Flash, Silverlight, extended DOM and numerous third party libraries. Browsers are the target of hackers, worms and malware with specific scope, almost on a daily basis. We have seen exploitation of these technologies on popular sites like Facebook, Twitter, Yahoo, Google, to name a few. The traditional boundaries of web applications are disappearing. Browsers today host a substantial part of web applications including data access, business logic, encryption, etc. along with presentation layer. This shift is making browser components a potential target for hackers. The danger of poorly written browser components being