Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
☆132Apr 25, 2022Updated 3 years ago
Alternatives and similar repositories for zenith
Users that are interested in zenith are comparing it to the libraries listed below
Sorting:
- ☆146Aug 17, 2022Updated 3 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- Recursive MMIO VM Escape PoC☆171May 13, 2022Updated 3 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆90Oct 8, 2023Updated 2 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- CVE-2022-0995 exploit☆499Mar 27, 2022Updated 3 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- ☆279Aug 30, 2022Updated 3 years ago
- ☆216Mar 29, 2024Updated last year
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆281May 27, 2023Updated 2 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Apr 8, 2022Updated 3 years ago
- ☆41Jan 26, 2024Updated 2 years ago
- Collection of materials relating to FORCEDENTRY☆100Mar 30, 2024Updated last year
- CVE-2022-25636☆436Mar 7, 2022Updated 3 years ago
- Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.☆26Mar 15, 2022Updated 3 years ago
- ☆342Jan 23, 2022Updated 4 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆122Apr 5, 2022Updated 3 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆168Nov 12, 2023Updated 2 years ago
- Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition☆66Jan 20, 2023Updated 3 years ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆495Feb 23, 2026Updated last week
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- ☆39Feb 10, 2021Updated 5 years ago
- JavaScript Fuzzing framework for v8☆144Jan 24, 2022Updated 4 years ago
- Corpus of public v8 vulnerability PoCs.☆224Jun 5, 2021Updated 4 years ago
- ☆69Jan 6, 2023Updated 3 years ago
- Research related☆89Apr 5, 2022Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Jul 27, 2022Updated 3 years ago
- ☆10Sep 1, 2021Updated 4 years ago
- ☆130May 15, 2025Updated 9 months ago
- ☆103Mar 8, 2022Updated 3 years ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,732Jan 2, 2026Updated 2 months ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆64Aug 15, 2023Updated 2 years ago
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆194Oct 29, 2022Updated 3 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago