De4dCr0w / Browser-pwn
Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn
☆183Updated 4 years ago
Alternatives and similar repositories for Browser-pwn:
Users that are interested in Browser-pwn are comparing it to the libraries listed below
- ☆289Updated 2 years ago
- ☆187Updated this week
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆221Updated 3 months ago
- ☆222Updated 4 years ago
- Collection of browser challenges☆131Updated 3 years ago
- Linux kernel privilege escalation techniques☆131Updated 8 months ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆93Updated 3 years ago
- ☆101Updated 3 years ago
- Corpus of public v8 vulnerability PoCs.☆211Updated 3 years ago
- ☆110Updated 11 months ago
- Automatic Exploit Generation Paper☆85Updated 3 years ago
- A tool for effective testing the binding layer of scripting languages☆78Updated 2 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆117Updated 2 years ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆59Updated 7 months ago
- attachments and (some) writeups/source code for RWCTF 5th☆56Updated 2 years ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆79Updated 10 months ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆46Updated 2 years ago
- 一些阅读源码和Fuzzing 的经验,涵盖黑盒与白盒测试..☆62Updated 3 years ago
- a new class of file structure attacks☆50Updated 2 years ago
- won't maintain☆128Updated 6 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆72Updated 2 years ago
- windows debug and exploit toolset for both user and kernel mode☆182Updated 7 months ago
- ☆67Updated 10 months ago
- gdb plugin for linux kernel to debug slub☆51Updated 4 years ago
- A DOM fuzzer☆145Updated 2 years ago
- Challenge attachments for RWCTF 3rd.☆92Updated 3 years ago
- ☆71Updated last year
- a GDB plug-in for inspecting mallocng☆56Updated 8 months ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 5 years ago
- ☆51Updated 2 years ago