Attacking-Edge-Through-the-JavaScript-Compiler
☆91Feb 15, 2019Updated 7 years ago
Alternatives and similar repositories for Attacking-Edge-Through-the-JavaScript-Compiler
Users that are interested in Attacking-Edge-Through-the-JavaScript-Compiler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆37Jun 7, 2019Updated 6 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- My Chrome and Safari exploit code + write-up repo☆533Nov 5, 2021Updated 4 years ago
- Webkit JavascriptCore Array unshift function had a race condition, it leads to RCE.☆44Dec 5, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 7 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- PoC☆212Jan 13, 2025Updated last year
- ☆105Dec 9, 2019Updated 6 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆110Mar 28, 2019Updated 7 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- A web page based fuzzer that generates random JS statements then fuzz in the web-browser.☆60May 6, 2019Updated 6 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- ☆74Jan 25, 2018Updated 8 years ago
- The Harvest of V8 regress.☆137Jul 18, 2020Updated 5 years ago
- Fuzzing Browsers☆317Dec 5, 2022Updated 3 years ago
- ☆31Jun 18, 2020Updated 5 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- The new phuzzing framework!☆164Jun 14, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of Browser DOM Vulnerabilities with PoCs☆40Nov 20, 2018Updated 7 years ago
- ☆17Sep 3, 2018Updated 7 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Feb 24, 2019Updated 7 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆120Apr 19, 2018Updated 8 years ago
- ☆93Jul 30, 2021Updated 4 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 7 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- ☆463Oct 4, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of links related to VMware escape exploits☆1,492Sep 4, 2024Updated last year
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 6 years ago
- ☆286Apr 23, 2020Updated 6 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆863Jun 4, 2020Updated 5 years ago