jiravvit / Chromium-Bug-Hunting-Project
웹 브라우저 취약점 탐지 자동화 프로젝트
☆10Updated 3 years ago
Alternatives and similar repositories for Chromium-Bug-Hunting-Project
Users that are interested in Chromium-Bug-Hunting-Project are comparing it to the libraries listed below
Sorting:
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆152Updated 6 years ago
- Dockerfile for Pwnable☆13Updated last month
- Challenges and writeups from SamsungCTF☆96Updated last year
- A collection of links related to Korean products hacking☆76Updated 9 months ago
- Run TrustZone TAs outside the secure world.☆14Updated last year
- ☆47Updated last year
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆41Updated 9 months ago
- ☆25Updated 3 years ago
- ☆20Updated 4 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆16Updated last year
- ctfs write-up☆30Updated last year
- Old and new CTFs about Linux kernel exploitation.☆54Updated 3 years ago
- A cross platform framework to recover driver's communication interface.☆11Updated 4 years ago
- NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)☆105Updated 3 years ago
- Collection of browser challenges☆136Updated 4 years ago
- For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.☆67Updated 2 years ago
- a new class of file structure attacks☆50Updated 2 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆40Updated last year
- ☆10Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆184Updated 4 years ago
- ☆71Updated 11 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆64Updated last year
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆20Updated 4 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆178Updated 3 weeks ago
- ☆29Updated 3 years ago
- ☆211Updated this week
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆77Updated 5 months ago
- Target components for kAFL/Nyx Fuzzer☆30Updated last month
- CVE-2019-2525 / CVE-2019-2548☆9Updated 4 years ago
- ☆78Updated last year