xv0nfers / V8-sbx-bypass-collection
☆163Updated 2 weeks ago
Alternatives and similar repositories for V8-sbx-bypass-collection:
Users that are interested in V8-sbx-bypass-collection are comparing it to the libraries listed below
- Targeting Windows Kernel Driver Fuzzer☆152Updated 2 months ago
- Collection of browser challenges☆121Updated 3 years ago
- Linux kernel privilege escalation techniques☆123Updated 5 months ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆179Updated 4 years ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆43Updated 5 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆211Updated last month
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆97Updated 4 months ago
- ☆67Updated 8 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆94Updated last year
- a new class of file structure attacks☆46Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆70Updated 2 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆58Updated 7 months ago
- ☆59Updated last year
- Blogpost about optimizing binary-only fuzzing with AFL++☆63Updated last year
- ☆115Updated 9 months ago
- ☆111Updated 5 months ago
- ☆71Updated last year
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆72Updated 2 years ago
- ☆78Updated 5 months ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago
- ☆63Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆101Updated last year
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆76Updated 7 months ago
- A V8 Sandbox Escape Technique.☆18Updated 6 months ago
- ☆167Updated 11 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆182Updated 10 months ago
- ☆27Updated last year
- A tool for automating setup of kernel pwn challenges☆53Updated 2 months ago
- ☆143Updated last year