bjrjk / CVE-2022-4262Links
Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.
☆103Updated 5 months ago
Alternatives and similar repositories for CVE-2022-4262
Users that are interested in CVE-2022-4262 are comparing it to the libraries listed below
Sorting:
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆194Updated 3 weeks ago
- ☆60Updated last year
- Repo for talk slides & materials☆21Updated 8 months ago
- Leveraging patch diffing to discover new vulnerabilities☆127Updated 9 months ago
- ☆127Updated 8 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 7 months ago
- ☆71Updated 2 years ago
- A collection of web browser CTF challenges and solutions.☆27Updated 2 years ago
- ☆65Updated last year
- Proof-of-Concept of exploits that may be published☆21Updated 9 months ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 9 months ago
- ☆80Updated 11 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆76Updated 6 months ago
- Linux Kernel N-day Exploit/Analysis.☆66Updated 9 months ago
- All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs☆9Updated 2 years ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆18Updated 11 months ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆79Updated last year
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆61Updated 2 months ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆48Updated last year
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Updated 5 months ago
- V8sandbox_bypass using stack misalignment☆21Updated 11 months ago
- ☆23Updated 6 months ago
- ☆130Updated 2 months ago
- ☆33Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- ☆36Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆67Updated last year