Escapingbug / awesome-browser-exploitLinks
awesome list of browser exploitation tutorials
β2,237Updated 2 years ago
Alternatives and similar repositories for awesome-browser-exploit
Users that are interested in awesome-browser-exploit are comparing it to the libraries listed below
Sorting:
- List of Awesome Advanced Windows Exploitation Referencesβ1,535Updated 3 years ago
- π¦ A curated list of the awesome resources about the Vulnerability Researchβ1,291Updated 5 years ago
- βοΈ A curated list of CVE PoCs.β3,465Updated 3 years ago
- A collection of links related to VMware escape exploitsβ1,479Updated last year
- awesome-linux-rootkitsβ1,984Updated 11 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learningβ847Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.β820Updated 4 years ago
- A curated list of awesome Fuzzing(or Fuzz Testing) for software securityβ939Updated 2 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice onβ¦β5,704Updated last year
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.β1,820Updated 6 years ago
- A curated list of awesome privilege escalationβ1,485Updated 4 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problemsβ1,144Updated 2 years ago
- share some useful archives about vm and qemu escape exploit.β575Updated last year
- A set of Linux binary exploitation tasks for beginners on various architecturesβ544Updated 3 years ago
- Repository for information about 0-days exploited in-the-wild.β845Updated 3 months ago
- Linux Binary Exploitationβ1,351Updated 4 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Developmentβ2,057Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linuxβ2,907Updated 9 months ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the pβ¦β1,112Updated 3 years ago
- A Course on Intermediate Level Linux Exploitationβ1,006Updated 5 years ago
- A collection of JavaScript engine CVEs with PoCsβ2,308Updated 6 years ago
- Tutorials for getting started with Pwntoolsβ1,531Updated last year
- An archive of low-level CTF challenges developed over the yearsβ650Updated 4 years ago
- Web CTF CheatSheet πβ2,908Updated last month
- Ctf solutions from p4 teamβ1,836Updated last year
- For Linux binary Exploitationβ842Updated 7 years ago
- Perfect Blue's CTF Writeupsβ693Updated last year
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already readβ1,348Updated 10 months ago
- DOM fuzzerβ1,764Updated last year
- Toolkit to emulate firmware and analyse it for security vulnerabilitiesβ1,524Updated last year