security-prince / Browser-Security-ResearchLinks
Resources for Browser Security Research
β44Updated 3 years ago
Alternatives and similar repositories for Browser-Security-Research
Users that are interested in Browser-Security-Research are comparing it to the libraries listed below
Sorting:
- A curated list of awesome browser security learning material.β144Updated 2 years ago
- π UCLA ACM Cyber's Fuzzing Labβ86Updated last week
- β22Updated 2 months ago
- β12Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwiseβ64Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guideβ42Updated 10 months ago
- Leveraging patch diffing to discover new vulnerabilitiesβ136Updated last year
- An automated setup for compiling & fuzzing Apache httpd serverβ50Updated 2 years ago
- A structure-aware HTTP fuzzing libraryβ218Updated 10 months ago
- β120Updated 2 months ago
- Automatically fuzz Rust projects from scratchβ58Updated 3 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.β106Updated 8 months ago
- How effective are LLMs in identifying and exploiting security vulnerabilities?β66Updated 8 months ago
- πΆ Design fun and insightful CTF challengesβ68Updated 3 years ago
- β118Updated 2 months ago
- An introduction course to system exploitation based on pwnable.kr challengesβ22Updated 8 months ago
- A collection of web browser CTF challenges and solutions.β30Updated 2 years ago
- β89Updated 3 years ago
- A curated list of argument injection vectorsβ41Updated 9 months ago
- CTFs and solutions for Linux binary exploitation.β111Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server categoryβ¦β61Updated 2 years ago
- Ansible build for Afl++ Frida-Modeβ25Updated last year
- Searcher for cross-site leaks (XS-Leaks)β82Updated 2 years ago
- Resources and writeups for studying & practicing iOS securityβ63Updated 4 years ago
- β116Updated 2 years ago
- List of Trusted Types bypassesβ102Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.β69Updated last year
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitationβ45Updated 3 years ago
- β33Updated 2 years ago
- Stereotyped Challenges (2014~2023)β85Updated 2 years ago