two-heart / v8-design-docsLinks
collection of V8 design documents
☆70Updated 2 weeks ago
Alternatives and similar repositories for v8-design-docs
Users that are interested in v8-design-docs are comparing it to the libraries listed below
Sorting:
- ☆67Updated 2 years ago
- ☆223Updated last month
- ☆39Updated last year
- ☆41Updated 2 years ago
- a browser fuzzer☆39Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆60Updated last year
- JavaScript Fuzzing framework for v8☆135Updated 3 years ago
- ☆77Updated 2 years ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆42Updated 11 months ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆40Updated last year
- Blogpost about optimizing binary-only fuzzing with AFL++☆65Updated last year
- Target components for kAFL/Nyx Fuzzer☆34Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆83Updated 7 months ago
- Target components for kAFL/Nyx Fuzzer☆31Updated 3 months ago
- A tool for effective testing the binding layer of scripting languages☆78Updated 3 years ago
- ☆26Updated last year
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆73Updated 10 months ago
- a new class of file structure attacks☆54Updated 2 years ago
- ☆21Updated 3 months ago
- Collection of browser challenges☆137Updated 4 years ago
- Linux kernel privilege escalation techniques☆137Updated 11 months ago
- An example fuzzer about how to fuzz a JS engine combinign Nautilus with Token-level fuzzing☆46Updated last year
- A V8 Sandbox Escape Technique.☆21Updated last year
- A collection of web browser CTF challenges and solutions.☆26Updated 2 years ago
- For V8CTF M122☆13Updated 10 months ago
- ☆39Updated last week
- ☆55Updated 8 months ago
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆83Updated 3 years ago