Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, and more.
☆202Mar 14, 2024Updated 2 years ago
Alternatives and similar repositories for virtualbox-qemu-vuln-research-notes
Users that are interested in virtualbox-qemu-vuln-research-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Jun 14, 2021Updated 4 years ago
- Corpus of public v8 vulnerability PoCs.☆225Jun 5, 2021Updated 4 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆199Jul 27, 2022Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆864Jun 4, 2020Updated 5 years ago
- JavaScript Fuzzing framework for v8☆144Jan 24, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collection of browser challenges☆137May 3, 2021Updated 5 years ago
- ☆451Oct 3, 2024Updated last year
- An updated collection of resources targeting browser-exploitation.☆834Mar 8, 2021Updated 5 years ago
- Internals information about Hyper-V☆736Mar 7, 2026Updated 2 months ago
- kernel-pwn and writeup collection☆715Oct 2, 2023Updated 2 years ago
- ☆145Aug 17, 2022Updated 3 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆474Jul 8, 2024Updated last year
- A collection of links related to VMware escape exploits☆1,491Sep 4, 2024Updated last year
- Winnie makes fuzzing Windows applications easy☆575Nov 28, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- qemu vulnerablity.☆57May 25, 2021Updated 4 years ago
- My Chrome and Safari exploit code + write-up repo☆533Nov 5, 2021Updated 4 years ago
- Toolkit for Hyper-V security research☆158Mar 7, 2022Updated 4 years ago
- Extreme Vulnerable IOKit driver☆92Jan 23, 2021Updated 5 years ago
- ☆41Jan 26, 2024Updated 2 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆74Jul 8, 2021Updated 4 years ago
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆563Dec 11, 2023Updated 2 years ago
- fuzzing + concolic = fuzzolic :)☆130Nov 6, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- repository for kernel exploit practice☆417Nov 12, 2019Updated 6 years ago
- A lightweight dynamic instrumentation library☆1,336Mar 13, 2026Updated last month
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- Learn how to combine libprotobuf-mutator with libfuzzer & AFL++☆258Sep 24, 2024Updated last year
- share some useful archives about vm and qemu escape exploit.☆589Mar 18, 2026Updated last month
- A toy Fuzzer for wasm fuzzing based on fuzzilli☆72Apr 8, 2022Updated 4 years ago
- ☆86Oct 29, 2023Updated 2 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆167May 4, 2024Updated 2 years ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Dec 25, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PAWNYABLE!☆236May 30, 2024Updated last year
- A Trace Explorer for Reverse Engineers☆1,535Oct 23, 2023Updated 2 years ago
- ☆227Dec 9, 2020Updated 5 years ago
- An awesome & curated list of binary rewriting papers☆268Apr 4, 2022Updated 4 years ago
- ☆56Aug 26, 2022Updated 3 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 7 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆127Jun 18, 2020Updated 5 years ago