Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn
☆187Dec 25, 2020Updated 5 years ago
Alternatives and similar repositories for Browser-pwn
Users that are interested in Browser-pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of browser challenges☆137May 3, 2021Updated 4 years ago
- An updated collection of resources targeting browser-exploitation.☆833Mar 8, 2021Updated 5 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆199Jul 27, 2022Updated 3 years ago
- ☆341Jan 23, 2022Updated 4 years ago
- JavaScript Fuzzing framework for v8☆145Jan 24, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆861Jun 4, 2020Updated 5 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- My Chrome and Safari exploit code + write-up repo☆533Nov 5, 2021Updated 4 years ago
- Corpus of public v8 vulnerability PoCs.☆225Jun 5, 2021Updated 4 years ago
- ☆298Jun 21, 2022Updated 3 years ago
- kernel-pwn and writeup collection☆711Oct 2, 2023Updated 2 years ago
- Fuzzing JavaScript Engines with Aspect-preserving Mutation☆231Oct 18, 2023Updated 2 years ago
- Winnie makes fuzzing Windows applications easy☆573Nov 28, 2022Updated 3 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆72Jan 6, 2023Updated 3 years ago
- ☆221Aug 27, 2025Updated 7 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,288Jan 29, 2026Updated 2 months ago
- ☆281Aug 2, 2025Updated 8 months ago
- awesome list of browser exploitation tutorials☆2,276Sep 18, 2023Updated 2 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,320Mar 2, 2026Updated last month
- Linux kernel module implementation & exploitation (pwn) labs.☆211Jan 26, 2022Updated 4 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Proof of concept code for CVE-2023-2008☆39Jun 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆764Jan 27, 2026Updated 2 months ago
- Research related☆89Apr 5, 2022Updated 4 years ago
- share some useful archives about vm and qemu escape exploit.☆588Mar 18, 2026Updated last month
- ☆393Oct 2, 2022Updated 3 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,493Sep 4, 2024Updated last year
- collection of V8 design documents☆81Jan 4, 2026Updated 3 months ago
- ☆146Aug 17, 2022Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 6 years ago
- Learn how to combine libprotobuf-mutator with libfuzzer & AFL++☆259Sep 24, 2024Updated last year
- Here is some resources about macOS/iOS system security.☆550Feb 19, 2025Updated last year
- Chrome V8 n-day exploits that I've written.☆207Apr 8, 2023Updated 3 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- ☆44Aug 8, 2022Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆201Mar 14, 2024Updated 2 years ago