jiravvit / Chromium-Bug-Hunting-ProjectLinks
웹 브라우저 취약점 탐지 자동화 프로젝트
☆11Updated 3 years ago
Alternatives and similar repositories for Chromium-Bug-Hunting-Project
Users that are interested in Chromium-Bug-Hunting-Project are comparing it to the libraries listed below
Sorting:
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆157Updated 6 years ago
- Challenges and writeups from SamsungCTF☆98Updated 2 years ago
- A cross platform framework to recover driver's communication interface.☆11Updated 4 years ago
- Old and new CTFs about Linux kernel exploitation.☆62Updated 3 years ago
- A collection of links related to Korean products hacking☆93Updated 3 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆55Updated last year
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆47Updated last year
- ☆27Updated 3 years ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆21Updated 4 years ago
- NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)☆109Updated 4 years ago
- a new class of file structure attacks☆57Updated 3 years ago
- Static Cross-Entry UAF Detector☆17Updated 7 months ago
- Collection of browser challenges☆138Updated 4 years ago
- Public Source code Release of Theori's AIxCC AFC Submission☆204Updated 4 months ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆205Updated 6 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆71Updated 2 years ago
- ☆44Updated 3 years ago
- ☆48Updated last year
- Target components for kAFL/Nyx Fuzzer☆35Updated 4 months ago
- ☆189Updated 10 months ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆45Updated 3 years ago
- A bunch of v8 resources (with a security focus)☆82Updated 2 weeks ago
- Run TrustZone TAs outside the secure world.☆15Updated last month
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆66Updated 3 weeks ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆97Updated 3 weeks ago
- ☆24Updated 4 years ago
- ☆68Updated 2 years ago
- CTF pwn problem writeup☆38Updated 2 years ago
- Linux kernel privilege escalation techniques☆148Updated last year
- CVE-2019-2525 / CVE-2019-2548☆11Updated 5 years ago