star-sg / CVELinks
A collection of proof-of-concept exploit scripts written by the STAR Labs team for various CVEs that they discovered or found by others.
☆277Updated 2 weeks ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below
Sorting:
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆226Updated 7 months ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆164Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Updated 4 years ago
- ☆232Updated this week
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆73Updated 11 months ago
- ☆171Updated 2 years ago
- Source code for the 2022 DEF CON Qualifiers.☆265Updated last year
- ☆215Updated last year
- ☆110Updated 8 months ago
- ☆189Updated last month
- ☆268Updated 3 months ago
- Collection of browser challenges☆137Updated 4 years ago
- ☆333Updated 3 years ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆74Updated 3 weeks ago
- ☆124Updated 2 years ago
- Corpus of public v8 vulnerability PoCs.☆214Updated 4 years ago
- windows debug and exploit toolset for both user and kernel mode☆189Updated last month
- Linux kernel privilege escalation techniques☆138Updated 11 months ago
- ☆294Updated 3 years ago
- Exploit for CVE-2022-27666☆205Updated 3 years ago
- ☆71Updated 2 years ago
- ☆72Updated last year
- ☆127Updated 8 months ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆133Updated 7 months ago
- ☆130Updated 2 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆197Updated 3 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆188Updated 2 months ago
- attachments and (some) writeups/source code for RWCTF 6th☆115Updated last year
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆62Updated 3 years ago
- Some Vulnerability in the some protocol are collected.☆103Updated last year