xv0nfers / V8-sbx-bypass-collectionLinks
☆249Updated 2 months ago
Alternatives and similar repositories for V8-sbx-bypass-collection
Users that are interested in V8-sbx-bypass-collection are comparing it to the libraries listed below
Sorting:
- Collection of browser challenges☆138Updated 4 years ago
- Linux kernel privilege escalation techniques☆144Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆79Updated 2 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆229Updated 9 months ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆91Updated last month
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆82Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Updated 4 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆53Updated last year
- A bunch of V8 resources (with a security focus)☆56Updated 2 weeks ago
- A tool for automating setup of kernel pwn challenges☆60Updated 4 months ago
- a new class of file structure attacks☆54Updated 2 years ago
- ☆80Updated 3 weeks ago
- ☆205Updated last month
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆189Updated 4 months ago
- ☆186Updated 7 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆129Updated last year
- Source code for the DEF CON 32 CTF Qualifiers.☆73Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆145Updated last week
- Source code for the DEF CON 31 CTF Qualifiers.☆124Updated 2 years ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆242Updated 2 weeks ago
- A collection of proof-of-concept exploit scripts written by the STAR Labs team for various CVEs that they discovered or found by others.☆288Updated 2 months ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆161Updated 9 months ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 3 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆68Updated last year
- Companion repository to the Fuzzing101 with LibAFL series of blog posts.☆157Updated 7 months ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆97Updated 3 years ago
- ☆21Updated 6 months ago
- An intuitive query API for IDA Pro☆159Updated 6 months ago
- CTF pwn problem writeup☆38Updated 2 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago