My browser pwn collections. Mainly JavaScript engine stuff.
☆34Mar 12, 2026Updated 2 weeks ago
Alternatives and similar repositories for browser-pwn-collection
Users that are interested in browser-pwn-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 2 months ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- ☆12Aug 22, 2022Updated 3 years ago
- ☆274Aug 2, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆13Mar 9, 2022Updated 4 years ago
- For V8CTF M123☆17Aug 25, 2024Updated last year
- A cli-based, multi-architecture gadget-finding tool, designed for fast operation, even with large binaries like browser engines and OS ke…☆17May 1, 2024Updated last year
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- A bunch of V8 resources (with a security focus)☆113Updated this week
- ☆23Jan 27, 2026Updated 2 months ago
- My public CTF challenge☆17Aug 25, 2025Updated 7 months ago
- Automatic use of House of Some & House of Illusion.☆87Sep 9, 2025Updated 6 months ago
- Linux kernel privilege escalation techniques☆153Aug 9, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆30Nov 25, 2025Updated 4 months ago
- ☆13Feb 24, 2024Updated 2 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- This repository contains multiple exploits I have written for various CVEs and CTFs☆28Jul 27, 2025Updated 8 months ago
- ☆23Aug 18, 2024Updated last year
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆48Jan 22, 2026Updated 2 months ago
- OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers☆15Jun 14, 2024Updated last year
- ☆12Mar 10, 2024Updated 2 years ago
- An IDA Pro plugin that display cross-references to functions or variables across the entire binary in Hex-Rays pseudocode☆129Jan 31, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆41Jan 26, 2024Updated 2 years ago
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- HITCON 2024 x DEVCORE Wargame☆31Aug 30, 2024Updated last year
- ☆30Feb 13, 2026Updated last month
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 6 months ago
- A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension.☆97Oct 17, 2024Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆70Nov 13, 2025Updated 4 months ago
- ☆21May 19, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Challenge handouts, source code, and solutions for UofTCTF 2026☆42Jan 13, 2026Updated 2 months ago
- 零基础入门V8引擎漏洞挖掘☆285Apr 8, 2024Updated last year
- a new class of file structure attacks☆60Nov 19, 2022Updated 3 years ago
- ☆16Apr 12, 2023Updated 2 years ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Dec 4, 2024Updated last year
- ☆28Feb 6, 2024Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year