☆23Jan 27, 2026Updated last month
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 6 months ago
- ☆42Oct 10, 2025Updated 4 months ago
- ☆34Apr 14, 2025Updated 10 months ago
- A collection of various exploits☆28Sep 17, 2024Updated last year
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- For V8CTF M123☆17Aug 25, 2024Updated last year
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- Windows Win32 Kernel Subsystem☆36Aug 23, 2025Updated 6 months ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- ☆28Feb 6, 2024Updated 2 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- ☆15Jul 28, 2024Updated last year
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- ☆12Aug 22, 2022Updated 3 years ago
- ☆15Aug 12, 2024Updated last year
- For V8CTF M122☆14Aug 25, 2024Updated last year
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated last year
- ☆13Feb 24, 2024Updated 2 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- All challenges and writups of the GlacierCTF 2023☆16Feb 15, 2024Updated 2 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- ☆272Aug 2, 2025Updated 7 months ago
- ☆19May 1, 2025Updated 10 months ago
- OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers☆15Jun 14, 2024Updated last year
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Jun 28, 2024Updated last year
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago
- My public CTF challenge☆17Aug 25, 2025Updated 6 months ago
- collection of V8 design documents☆80Jan 4, 2026Updated last month
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- ☆17Feb 3, 2023Updated 3 years ago