security-prince / Browser-Security-ResearchLinks
Resources for Browser Security Research
☆53Updated 3 years ago
Alternatives and similar repositories for Browser-Security-Research
Users that are interested in Browser-Security-Research are comparing it to the libraries listed below
Sorting:
- A curated list of awesome browser security learning material.☆148Updated 3 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 3 years ago
- ☆12Updated 3 years ago
- CTF write-ups☆100Updated 4 months ago
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆68Updated 11 months ago
- ☆22Updated 2 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆89Updated 2 months ago
- List of Trusted Types bypasses☆102Updated last year
- Awesome MXSS ??☆56Updated last year
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆65Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated last year
- ☆89Updated last year
- XS-Leak Browser Test Suite☆85Updated 2 years ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆211Updated 2 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆88Updated 6 months ago
- A structure-aware HTTP fuzzing library☆217Updated 3 weeks ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated last year
- 🕶 Design fun and insightful CTF challenges☆70Updated 3 years ago
- RE / Binary Exploitation Resources☆74Updated 8 years ago
- Resources and writeups for studying & practicing iOS security☆64Updated 4 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- This is the open source version of vulnerable.codes platform.☆28Updated 9 months ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 11 months ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- ☆116Updated 2 years ago
- Challenges I wrote for various CTF competitions☆45Updated last year
- Some vulnerability research slides that I made☆12Updated 4 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- Trail of Bits Testing Handbook - appsec.guide☆92Updated this week