joydo / CVE-WriteupsLinks
My Personal Reading lists for CVE Writeups
☆34Updated 3 years ago
Alternatives and similar repositories for CVE-Writeups
Users that are interested in CVE-Writeups are comparing it to the libraries listed below
Sorting:
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆102Updated 3 months ago
- ☆26Updated 3 years ago
- ☆46Updated last year
- ☆115Updated last year
- ☆32Updated 5 months ago
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- Writeups for CTFs☆69Updated 2 months ago
- Old and new CTFs about Linux kernel exploitation.☆55Updated 3 years ago
- WebGL fuzzer☆39Updated 2 years ago
- ☆50Updated 6 years ago
- A collection of curated resources and CVEs I use for research.☆106Updated 3 years ago
- ☆78Updated 3 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆139Updated 4 years ago
- ☆60Updated last year
- ☆49Updated 4 years ago
- Example files to experience basic exploit techniques.☆74Updated 6 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆41Updated last year
- ☆85Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆194Updated 2 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Updated 7 months ago
- ☆56Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- A collection of web browser CTF challenges and solutions.☆26Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Binary exploitation exercises and scripts☆10Updated 3 years ago
- ☆71Updated last year