DarkNavySecurity / PoCLinks
☆215Updated 4 months ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆88Updated last year
- ☆66Updated 2 years ago
- Slides from Off-By-One Conferences☆30Updated last year
- ☆70Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆100Updated 3 years ago
- A V8 Sandbox Escape Technique.☆33Updated last year
- ☆64Updated 2 years ago
- ☆265Updated 5 months ago
- ☆133Updated last month
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated 2 years ago
- Linux kernel privilege escalation techniques☆151Updated last year
- ☆86Updated 4 months ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Updated 11 months ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Updated 3 years ago
- ☆25Updated 2 years ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆86Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Updated 5 years ago
- ☆124Updated last year
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Updated last year
- ☆130Updated 8 months ago
- CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC☆91Updated 6 months ago
- ☆130Updated last year
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated 2 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Updated 2 years ago
- ☆58Updated last year
- attachments and (some) writeups/source code for RWCTF 5th☆59Updated 3 years ago
- ☆73Updated last year
- ☆80Updated last year
- ☆41Updated last year