wh1ant / vulnjsLinks
Research browsers
☆42Updated 3 months ago
Alternatives and similar repositories for vulnjs
Users that are interested in vulnjs are comparing it to the libraries listed below
Sorting:
- MCP for Pwn☆118Updated last week
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 7 months ago
- ☆81Updated last year
- Static binary instrumentation for windows kernel drivers, to use with winafl☆76Updated 7 months ago
- ☆22Updated 2 weeks ago
- V8sandbox_bypass using stack misalignment☆22Updated last year
- ☆36Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆48Updated last year
- ☆60Updated last year
- Repo for talk slides & materials☆21Updated 9 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆216Updated this week
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆62Updated 9 months ago
- ☆32Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆62Updated 3 weeks ago
- ☆128Updated 10 months ago
- ☆18Updated last month
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆39Updated this week
- ☆27Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆132Updated 10 months ago
- A in-the-wild V8 type confusion bug.☆28Updated last month
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated 6 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆70Updated last year
- ☆33Updated 8 months ago
- ☆109Updated 3 weeks ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆96Updated 11 months ago
- ☆83Updated last month
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 9 months ago
- ☆37Updated last year