Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-browser-exploit
awesome list of browser exploitation tutorials
https://github.com/escapingbug/awesome-browser-exploit
Last synced: 2 days ago
JSON representation
-
Writeup and Exploit Tech
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Getting into Browser Exploitation - Recreating Safari Wekit Exploit
- Mobile Pwn2Own Autumn 2013 - Chrome on Android - Exploit Writeup
- Exploiting a V8 OOB write
- Pointer Compression in V8
- Exploiting the Math.expm1 typing bug in V8
- Exploiting an Accidentally Discovered V8 RCE
- Escaping the Chrome Sandbox via an IndexedDB Race Condition
- Exploiting CVE-2020-0041 - Part 1: Escaping the Chrome Sandbox
- Cleanly Escaping the Chrome Sandbox
- Escaping the Chrome Sandbox with RIDL
- You Won't Believe what this One Line Change Did to the Chrome Sandbox
- 2012 - Memory Corruption Exploitation In Internet Explorer
- 2013 - IE 0day Analysis And Exploit
- 2014 - Write Once, Pwn Anywhere
- 2014 - The Art of Leaks: The Return of Heap Feng Shui
- 2014 - IE 11 0day & Windows 8.1 Exploit
- 2014 - IE11 Sandbox Escapes Presentation
- 2016 - Look Mom, I don't use Shellcode
- 2016 - Windows 10 x64 edge 0day and exploit
- 2017 - The Secret of ChakraCore: 10 Ways to Go Beyond the Edge
- 2017 - From Out of Memory to Remote Code Executio
- 2018 - Edge Inline Segment Use After Free (Chinese)
- Vulnerability Discovery Against Apple Safari
- A Methodical Approach to Browser Exploitation - six part blog
- Adventures on Hunting for Safari Sandbox Escapes
- JITSploitation I: A JIT Bug
- JITSploitation II: Getting Read/Write
- JITSploitation III: Subverting Control Flow
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- Firefox Spidermonkey JS Engine Exploitation
- it-sec catalog browser exploitation chapter
- 2014 - Smashing The Browser: From Vulnerability Discovery To Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- 2015 - Spartan 0day & Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- 2015 - 浏览器漏洞攻防对抗的艺术 Art of browser Vulnerability attack and defense (Chinese)
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
- Exploiting a V8 OOB write
- Exploiting a V8 OOB write
- 2013 - IE 0day Analysis And Exploit
-
Basic
- on-stack replacement in v8
- A tour of V8: Garbage Collection
- A tour of V8: object representation
- v8 fast properties
- Intro to Chrome’s V8 from an exploit development angle
- Introduction to TurboFan
- V8 / Chrome Architecture Reading List - For Vulnerability Researchers
- Microsoft Edge MemGC Internals
- JSC loves ES6
- JavaScriptCore, the WebKit JS implementation
- WebKit & JSC Architecture Reading List - For Vulnerability Researchers
- SpiderMonkey Internals
- JavaScript:New to SpiderMonkey
- A tour of V8: Garbage Collection
- v8 github mirror(docs within)
- A tour of V8: Garbage Collection
- A tour of V8: object representation
- learning v8
- saelo's Pwn2Own 2018 Safari + macOS
- The ECMA and the Chakra
-
Browser Basic
-
Fuzzing
- The Power-Of Pair
- Browser Fuzzing
- Taking Browsers Fuzzing To The Next (DOM) Level
- browser fuzzing framework - morph
- Browser Fuzzing with a Twist
- Browser fuzzing - peach
- 从零开始学Fuzzing系列:浏览器挖掘框架Morph诞生记 Learn Fuzzing from Very Start: the Birth of Browser Vulnerability Detection Framework Morph(Chinese)
- BROWSER FUZZING IN 2014:David vs Goliath
- A Review of Fuzzing Tools and Methods
-
Mitigation
- 2017 - CROSS THE WALL-BYPASS ALL MODERN MITIGATIONS OF MICROSOFT EDGE
- Browser security mitigations against memory corruption vulnerabilities
- Browsers and app specific security mitigation (Russian) part 1
- Browsers and app specific security mitigation (Russian) part 2
- Browsers and app specific security mitigation (Russian) part 3
-
Collections
Categories
Sub Categories