Resources for Browser Security Research
☆56Sep 17, 2022Updated 3 years ago
Alternatives and similar repositories for Browser-Security-Research
Users that are interested in Browser-Security-Research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of awesome browser security learning material.☆152Nov 20, 2022Updated 3 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- ☆16Sep 5, 2024Updated last year
- A collection of curated resources and CVEs I use for research.☆108Aug 8, 2021Updated 4 years ago
- Formalizing Polynomial Commitment Schemes in the Interactive Theorem Prover Isabelle.☆10Apr 20, 2026Updated 2 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- CVE-2019-2525 / CVE-2019-2548☆11Sep 4, 2020Updated 5 years ago
- ☆12Jun 5, 2024Updated last year
- awesome list of browser exploitation tutorials☆2,278Sep 18, 2023Updated 2 years ago
- 快速对自己项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新☆21Jan 27, 2022Updated 4 years ago
- A study of V8 internals.☆77Dec 22, 2020Updated 5 years ago
- ☆22Dec 1, 2025Updated 5 months ago
- Custom Agent and Tooling for using Nyx with Firefox☆22Jul 23, 2025Updated 9 months ago
- Funny telegram bot☆11Jan 7, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof-of-Concept exploit (SQLI BookingPress before 1.0.11)☆12Oct 30, 2022Updated 3 years ago
- An updated collection of resources targeting browser-exploitation.☆834Mar 8, 2021Updated 5 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Feb 17, 2025Updated last year
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- ☆25Jul 7, 2023Updated 2 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- JP2KLib.dll harness for WinAFL☆43Apr 20, 2021Updated 5 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆231Jan 7, 2024Updated 2 years ago
- A websocket-based reverse (javascript) shell for XSS attacks.☆29Sep 2, 2022Updated 3 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 4 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Cloudshell proof of concept for LiveOverflow☆15Aug 8, 2019Updated 6 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆62Dec 18, 2023Updated 2 years ago
- Great security list for fun and profit☆29Jul 24, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆96Feb 12, 2025Updated last year
- My conference presentations and Materials for them.☆33Aug 29, 2022Updated 3 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆27Mar 9, 2024Updated 2 years ago
- Automated coverage analysis of WASM executables on embedded and other constrained environments☆38Aug 13, 2024Updated last year
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- ☆60Feb 14, 2026Updated 2 months ago