bjrjk / CVE-2022-4262
Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.
☆98Updated 2 months ago
Alternatives and similar repositories for CVE-2022-4262:
Users that are interested in CVE-2022-4262 are comparing it to the libraries listed below
- ☆59Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆58Updated 6 months ago
- ☆123Updated 5 months ago
- Repo for talk slides & materials☆18Updated 5 months ago
- ☆70Updated last year
- Blogpost about optimizing binary-only fuzzing with AFL++☆64Updated last year
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆119Updated 6 months ago
- ☆62Updated last year
- ☆37Updated 11 months ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆78Updated 10 months ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆59Updated 7 months ago
- ☆195Updated last week
- ASLR bypass without infoleak☆160Updated 3 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- Linux Kernel N-day Exploit/Analysis.☆64Updated 6 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆114Updated 11 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆72Updated 2 months ago
- ☆115Updated last year
- ☆80Updated 7 months ago
- public archive for corCTF 2023☆16Updated last year
- Collection of browser challenges☆130Updated 3 years ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆50Updated last year
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆18Updated 8 months ago
- CTF pwn problem writeup☆37Updated 2 years ago
- ☆27Updated 3 years ago
- ☆46Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated last year
- ☆122Updated last year