security-prince / Browser-Security-Research
Resources for Browser Security Research
☆38Updated 2 years ago
Alternatives and similar repositories for Browser-Security-Research:
Users that are interested in Browser-Security-Research are comparing it to the libraries listed below
- A curated list of awesome browser security learning material.☆141Updated 2 years ago
- Gonna share my writeups and resources here☆64Updated 3 months ago
- ☆23Updated 2 months ago
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆40Updated last month
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆59Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆81Updated 3 months ago
- ☆12Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- Ansible build for Afl++ Frida-Mode☆23Updated 10 months ago
- List of Trusted Types bypasses☆91Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆67Updated 3 years ago
- CTF write-ups☆82Updated 4 months ago
- Awesome MXSS ??☆49Updated 6 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆40Updated 4 months ago
- 🕶 Design fun and insightful CTF challenges☆60Updated 3 years ago
- esoteric☆51Updated 4 years ago
- Searcher for cross-site leaks (XS-Leaks)☆81Updated 2 years ago
- Security Advisories☆32Updated last week
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆45Updated last year
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆119Updated 5 months ago
- A curated list of argument injection vectors☆40Updated 2 months ago
- ☆36Updated last year
- Challenges I wrote for various CTF competitions☆41Updated 8 months ago
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 8 months ago
- ☆83Updated 7 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆98Updated 2 months ago