MaherAzzouzi / BrowserExploitationLinks
Browser exploitation v8 and sandbox escape challenges with solutions.
☆27Updated 3 years ago
Alternatives and similar repositories for BrowserExploitation
Users that are interested in BrowserExploitation are comparing it to the libraries listed below
Sorting:
- ☆14Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆19Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- MacOS kernel memory leak (4 bytes)☆30Updated 5 years ago
- Here I store my proof of concepts☆14Updated 8 months ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆17Updated 2 years ago
- ☆20Updated 2 years ago
- ☆16Updated 11 months ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- ☆18Updated 3 years ago
- ☆12Updated 3 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Updated 4 months ago
- ASLR bypass in Chrome version 77☆24Updated 5 years ago
- ☆31Updated 4 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆12Updated 7 months ago
- ☆34Updated 3 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆25Updated last year
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- 2018 Advent Calendar browser pwnables☆15Updated 6 years ago
- ☆56Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated last year
- ☆18Updated 3 years ago
- Full chain Chrome 71.0.3578.98 exploit☆18Updated 3 years ago
- ☆78Updated 3 months ago
- a list of web browser vulnerabilities☆20Updated 5 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago