anvbis / browser_ctfLinks
A collection of web browser CTF challenges and solutions.
☆32Updated 3 years ago
Alternatives and similar repositories for browser_ctf
Users that are interested in browser_ctf are comparing it to the libraries listed below
Sorting:
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- ☆58Updated 2 years ago
- ☆130Updated last year
- ☆66Updated 2 years ago
- ☆70Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- Collection of browser challenges☆139Updated 4 years ago
- Leveraging patch diffing to discover new vulnerabilities☆138Updated last year
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Updated 3 years ago
- WebGL fuzzer☆39Updated 2 years ago
- Repo for talk slides & materials☆21Updated last year
- A collection of curated resources and CVEs I use for research.☆107Updated 4 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆61Updated 3 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆263Updated 4 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆60Updated 2 years ago
- ☆41Updated 2 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆80Updated 11 months ago
- ☆134Updated last month
- ☆81Updated last year
- ☆267Updated 5 months ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Updated 5 months ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆59Updated last year
- harness for fuzzing with winafl. both public and my own which i have released.☆58Updated 4 years ago
- public archive for corCTF 2023☆18Updated 2 years ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆88Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- For V8CTF M122☆14Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆154Updated 2 weeks ago