Advanced exploits that I wrote for Pwn2Own competitions and other occasions
☆169Mar 23, 2024Updated last year
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Apr 24, 2021Updated 4 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Feb 12, 2025Updated last year
- ☆15Nov 3, 2023Updated 2 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆425Mar 20, 2022Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Aug 3, 2025Updated 6 months ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- ☆129May 15, 2025Updated 9 months ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Jul 21, 2022Updated 3 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆127Nov 15, 2025Updated 3 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆81Feb 5, 2025Updated last year
- ☆10Jun 2, 2021Updated 4 years ago
- ☆11May 17, 2024Updated last year
- ☆130Aug 23, 2022Updated 3 years ago
- ☆58Jan 29, 2024Updated 2 years ago
- Report and exploit of CVE-2023-36427☆90Nov 22, 2023Updated 2 years ago
- ☆30Aug 24, 2025Updated 6 months ago
- PoC CVE-2021-30632 - Out of bounds write in V8☆74Sep 20, 2021Updated 4 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 2 weeks ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- ☆72Oct 31, 2023Updated 2 years ago
- My Chrome and Safari exploit code + write-up repo☆531Nov 5, 2021Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- ☆64Aug 15, 2023Updated 2 years ago
- ☆23Nov 5, 2021Updated 4 years ago
- ☆26Oct 29, 2021Updated 4 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆71Mar 25, 2022Updated 3 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆900Jan 21, 2025Updated last year
- Windows KASLR bypass using prefetch side-channel☆177Apr 26, 2024Updated last year
- Analysis of the vulnerability☆50Jan 23, 2024Updated 2 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago