Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn
☆187Dec 25, 2020Updated 5 years ago
Alternatives and similar repositories for Browser-pwn
Users that are interested in Browser-pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of browser challenges☆137May 3, 2021Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆834Mar 8, 2021Updated 5 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆199Jul 27, 2022Updated 3 years ago
- ☆342Jan 23, 2022Updated 4 years ago
- JavaScript Fuzzing framework for v8☆144Jan 24, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆864Jun 4, 2020Updated 5 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- My Chrome and Safari exploit code + write-up repo☆533Nov 5, 2021Updated 4 years ago
- Corpus of public v8 vulnerability PoCs.☆225Jun 5, 2021Updated 4 years ago
- ☆299Jun 21, 2022Updated 3 years ago
- kernel-pwn and writeup collection☆715Oct 2, 2023Updated 2 years ago
- Fuzzing JavaScript Engines with Aspect-preserving Mutation☆231Oct 18, 2023Updated 2 years ago
- Winnie makes fuzzing Windows applications easy☆575Nov 28, 2022Updated 3 years ago
- A collection of curated resources and CVEs I use for research.☆108Aug 8, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆72Jan 6, 2023Updated 3 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,291Jan 29, 2026Updated 3 months ago
- ☆223Aug 27, 2025Updated 8 months ago
- ☆282Aug 2, 2025Updated 9 months ago
- awesome list of browser exploitation tutorials☆2,278Sep 18, 2023Updated 2 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,326Mar 2, 2026Updated 2 months ago
- Linux kernel module implementation & exploitation (pwn) labs.☆212Jan 26, 2022Updated 4 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆763Jan 27, 2026Updated 3 months ago
- Research related☆88Apr 5, 2022Updated 4 years ago
- share some useful archives about vm and qemu escape exploit.☆589Mar 18, 2026Updated last month
- ☆394Oct 2, 2022Updated 3 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,491Sep 4, 2024Updated last year
- collection of V8 design documents☆81Jan 4, 2026Updated 4 months ago
- ☆145Aug 17, 2022Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 7 years ago
- Learn how to combine libprotobuf-mutator with libfuzzer & AFL++☆258Sep 24, 2024Updated last year
- Here is some resources about macOS/iOS system security.☆550Feb 19, 2025Updated last year
- Chrome V8 n-day exploits that I've written.☆209Apr 8, 2023Updated 3 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆245Dec 23, 2024Updated last year
- ☆44Aug 8, 2022Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆202Mar 14, 2024Updated 2 years ago