xv0nfers / V8-sbx-bypass-collection
☆166Updated last week
Alternatives and similar repositories for V8-sbx-bypass-collection:
Users that are interested in V8-sbx-bypass-collection are comparing it to the libraries listed below
- Collection of browser challenges☆121Updated 3 years ago
- Targeting Windows Kernel Driver Fuzzer☆157Updated last week
- Linux kernel privilege escalation techniques☆125Updated 6 months ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆179Updated 4 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆213Updated last month
- a new class of file structure attacks☆46Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆70Updated 2 months ago
- ☆66Updated 8 months ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆44Updated 5 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆97Updated this week
- An intuitive query API for IDA Pro☆155Updated last month
- ☆58Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆94Updated last year
- ☆166Updated last week
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆102Updated last year
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆71Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆53Updated 2 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆59Updated 7 months ago
- ☆78Updated 5 months ago
- collection of V8 design documents☆53Updated 5 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆182Updated 11 months ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- ☆62Updated last year
- Blogpost about optimizing binary-only fuzzing with AFL++☆63Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆55Updated 3 months ago
- ☆115Updated 10 months ago
- ☆143Updated last year
- ☆111Updated 5 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆35Updated last year