TrapaSecurity / PresentationsLinks
☆16Updated last year
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- ☆34Updated 7 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- poc code for CVE-2024-38080☆29Updated last year
- Collection of slides☆33Updated 2 months ago
- Here I store my proof of concepts☆14Updated last year
- ☆19Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Updated 2 years ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆28Updated 3 months ago
- Full chain Chrome 71.0.3578.98 exploit☆19Updated 4 years ago
- ☆27Updated last year
- A in-the-wild V8 type confusion bug.☆28Updated 3 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Updated last year
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆19Updated 2 months ago
- ☆61Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- ☆14Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Updated 4 years ago
- Proof of concept code for CVE-2023-2008☆40Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Updated 3 years ago
- ☆79Updated 8 months ago
- For V8CTF M123☆16Updated last year
- LPE of CVE-2024-26230☆24Updated last year
- V8sandbox_bypass using stack misalignment☆23Updated last year
- ☆12Updated 3 years ago
- ☆12Updated 2 years ago
- ☆14Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 4 years ago