Some V8 n-day exploits that I've written
☆50Mar 1, 2026Updated this week
Alternatives and similar repositories for v8-ndays
Users that are interested in v8-ndays are comparing it to the libraries listed below
Sorting:
- ☆16Updated this week
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- Coverage-guided Fuzzing as Online Stochastic Control☆61Nov 7, 2024Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 4 months ago
- ☆21Apr 6, 2025Updated 10 months ago
- ☆28Feb 6, 2024Updated 2 years ago
- ☆28Jun 14, 2022Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- A PlayStation 4 Kernel Debugger [WIP]☆36Jul 15, 2025Updated 7 months ago
- Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never resear…☆81Feb 22, 2026Updated last week
- MCP for Pwn☆218Updated this week
- Simple WebSocket fuzzer☆32Jun 15, 2023Updated 2 years ago
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Updated this week
- Static binary instrumentation for windows kernel drivers, to use with winafl☆81Feb 5, 2025Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- Code Scanner for AI (formaly vulnhuntrs) 🎯☆43Feb 3, 2026Updated last month
- A simple but useful project maybe help you reverse Windows.☆41Apr 2, 2024Updated last year
- You can use it to modify HTTP (S) response values, redirect static file requests to the local file directory, and support batch modificat…☆18Nov 30, 2022Updated 3 years ago
- ☆14Feb 18, 2026Updated last week
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆104Jan 26, 2026Updated last month
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Jul 6, 2024Updated last year
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆126Updated this week
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- prediction market indexer with semantic search☆35Jan 27, 2026Updated last month
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 4 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆96Jun 29, 2022Updated 3 years ago
- Rapid Response sample Foundry app☆17Feb 23, 2026Updated last week
- ☆11Sep 5, 2019Updated 6 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- Lightweight throttle layer for alloy providers☆16Mar 10, 2025Updated 11 months ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 5 months ago
- wall time exex for reth☆12Aug 5, 2024Updated last year
- Public Audits in the NEAR Ecosystem☆14Jun 10, 2024Updated last year
- An advanced library for protecting/obfuscating kernel drivers using the C++ 17 standard.☆23Feb 22, 2026Updated last week
- ☆12Jan 28, 2023Updated 3 years ago