0xbigshaq / php7-internals
Research about the Zend Engine
☆262Updated 4 years ago
Alternatives and similar repositories for php7-internals:
Users that are interested in php7-internals are comparing it to the libraries listed below
- Experimental fuzzer for PHP libraries☆421Updated last year
- PHP function tracker☆241Updated last month
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromjpeg()☆148Updated 9 years ago
- php-fpm+Nginx RCE☆104Updated 4 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆162Updated 7 years ago
- SSD Secure Disclosure Advisories☆169Updated 4 years ago
- Audit your PHP version for known CVEs and patches☆116Updated 2 weeks ago
- Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )☆32Updated 5 years ago
- A Control Flow Graph implementation in PHP☆243Updated last month
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- Race Condition framework☆269Updated 2 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- ☆54Updated 6 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago
- A static analysis tool for security☆339Updated 5 months ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆139Updated 4 years ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆223Updated 3 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆155Updated 5 years ago
- writeup of CVE-2020-1362☆232Updated 4 years ago
- Collection of vulnerable and fixed PHP synthetic test cases☆61Updated last year
- Corpus of public v8 vulnerability PoCs.☆211Updated 3 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 7 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆188Updated 4 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆226Updated 2 years ago
- CTF write-ups by PDKT team with English and Indonesian language☆77Updated 5 years ago
- Exploit for CVE-2022-27666☆204Updated 3 years ago
- Tools for fuzzing RDP☆130Updated 3 years ago
- '>"><img src=x onerror=alert(1) /><b>asd</b>☆46Updated 3 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago