Escapingbug / awesome-browser-exploit
awesome list of browser exploitation tutorials
β2,146Updated last year
Alternatives and similar repositories for awesome-browser-exploit
Users that are interested in awesome-browser-exploit are comparing it to the libraries listed below
Sorting:
- List of Awesome Advanced Windows Exploitation Referencesβ1,488Updated 3 years ago
- π¦ A curated list of the awesome resources about the Vulnerability Researchβ1,197Updated 4 years ago
- βοΈ A curated list of CVE PoCs.β3,398Updated 3 years ago
- A collection of links related to VMware escape exploitsβ1,421Updated 8 months ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linuxβ2,636Updated 2 months ago
- awesome-linux-rootkitsβ1,830Updated 4 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice onβ¦β5,510Updated last year
- Tutorials for getting started with Pwntoolsβ1,467Updated 7 months ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.β1,773Updated 5 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Developmentβ1,982Updated 2 years ago
- share some useful archives about vm and qemu escape exploit.β548Updated last year
- A Collection of Chrome Sandbox Escape POCs/Exploits for learningβ819Updated 4 years ago
- A collection of links related to Linux kernel security and exploitationβ5,935Updated last week
- An updated collection of resources targeting browser-exploitation.β817Updated 4 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problemsβ1,127Updated last year
- A curated list of awesome privilege escalationβ1,334Updated 11 months ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the pβ¦β1,056Updated 2 years ago
- Web CTF CheatSheet πβ2,767Updated last month
- A curated list of awesome Fuzzing(or Fuzz Testing) for software securityβ887Updated last year
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already readβ1,308Updated 2 months ago
- An archive of low-level CTF challenges developed over the yearsβ630Updated 3 years ago
- A collection of JavaScript engine CVEs with PoCsβ2,299Updated 5 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, Aβ¦β1,962Updated 2 months ago
- A Curated list of IoT Security Resourcesβ2,878Updated 5 months ago
- A repository for learning various heap exploitation techniques.β7,673Updated 2 weeks ago
- linux-kernel-exploits LinuxεΉ³ε°ζζζΌζ΄ιεβ5,416Updated 4 years ago
- My proof-of-concept exploits for the Linux kernelβ1,470Updated 3 years ago
- pwninit - automate starting binary exploit challengesβ932Updated 9 months ago
- A Course on Intermediate Level Linux Exploitationβ1,001Updated 4 years ago
- Build a database of libc offsets to simplify exploitationβ1,778Updated 6 months ago