KpwnZ / browser-pwn-collectionView external linksLinks
My browser pwn collections. Mainly JavaScript engine stuff.
☆33Jan 27, 2025Updated last year
Alternatives and similar repositories for browser-pwn-collection
Users that are interested in browser-pwn-collection are comparing it to the libraries listed below
Sorting:
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆102Jan 13, 2026Updated last month
- For V8CTF M123☆17Aug 25, 2024Updated last year
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- ☆270Aug 2, 2025Updated 6 months ago
- ☆30Nov 25, 2025Updated 2 months ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 7 months ago
- ☆12Aug 22, 2022Updated 3 years ago
- ☆23Aug 18, 2024Updated last year
- ☆23Jan 27, 2026Updated 2 weeks ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- ☆13Feb 24, 2024Updated last year
- A bunch of V8 resources (with a security focus)☆94Feb 7, 2026Updated last week
- My public CTF challenge☆17Aug 25, 2025Updated 5 months ago
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 5 months ago
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- Accelerated execution for fast Windows fuzzing☆25Jan 9, 2025Updated last year
- IDA plugin to make classes automatically☆20Oct 31, 2024Updated last year
- Linux kernel privilege escalation techniques☆152Aug 9, 2024Updated last year
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- ☆21May 19, 2022Updated 3 years ago
- ☆26Updated this week
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Challenge handouts, source code, and solutions for UofTCTF 2026☆35Jan 13, 2026Updated last month
- An IDA Pro plugin that display cross-references to functions or variables across the entire binary in Hex-Rays pseudocode☆125Jan 31, 2026Updated 2 weeks ago
- a new class of file structure attacks☆58Nov 19, 2022Updated 3 years ago
- ☆27Feb 6, 2024Updated 2 years ago
- ☆41Jan 26, 2024Updated 2 years ago
- ☆12Mar 10, 2024Updated last year
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆12Mar 9, 2022Updated 3 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆48Sep 16, 2024Updated last year
- A cli-based, multi-architecture gadget-finding tool, designed for fast operation, even with large binaries like browser engines and OS ke…☆17May 1, 2024Updated last year
- For V8CTF M122☆14Aug 25, 2024Updated last year
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- ☆35Apr 14, 2025Updated 10 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Jul 9, 2025Updated 7 months ago
- ☆34Jun 11, 2024Updated last year
- ☆39Jul 25, 2025Updated 6 months ago