AsiaSecWest-2018-Chakra-vulnerability-and-exploit-bypass-all-system-mitigation
Browser exploit guide
A comprehensive guide to bypassing security measures in Chakra browser vulnerabilities
Chakra vulnerability and exploit bypass all system mitigation
82 stars
4 watching
19 forks
last commit: over 6 years ago Related projects:
Repository | Description | Stars |
---|---|---|
exp-sky/hitcon-2014-ie-11-0day-windows-8.1-exploit | An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. | 25 |
exp-sky/xkungfoo-2013 | Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods | 6 |
nccgroup/exploit_mitigations | A knowledge base documenting exploit mitigations across various operating systems and software | 874 |
masatokinugawa/filterbypass | Provides cheat sheets and guidance on bypassing browser XSS filters to inject malicious content into web pages | 1,116 |
demi6od/smashing_the_browser | An in-depth exploration of browser exploitation techniques and vulnerability discovery | 446 |
kibercthulhu/gdb-peda-cheatsheet | A collection of tips and tricks for using GDB-PEDA in exploit development | 16 |
sslab-gatech/pwn2own2020 | An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS | 402 |
hashishrajan/cloud-security-vulnerabilities | Lists publicly disclosed vulnerabilities in various cloud services. | 357 |
exp-sky/hitcon-2015-spartan-0day-exploit | Exploiting vulnerabilities in Microsoft's Spartan memory management system to bypass security features and gain unauthorized access | 26 |
exp-sky/hitcon-2016-windows-10-x64-edge-0day-and-exploit | Exploiting Windows 10 x64 edge case on Microsoft Edge browser | 101 |
hipotermia/vaya-ciego-nen | Detects and exploits Blind Cross-site scripting (XSS) vulnerabilities to retrieve sensitive information and control user interactions. | 40 |
vysecurity/cve-2018-4878 | Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. | 87 |
arimogi/google-dorks | A collection of tools and techniques for exploiting vulnerabilities in Google services | 45 |
scipag/password-list | Provides a collection of leaked passwords compiled into ordered lists for analysis and use in security testing | 319 |
owasp/owasp-vwad | A registry of known vulnerable web applications | 873 |