AsiaSecWest-2018-Chakra-vulnerability-and-exploit-bypass-all-system-mitigation
Browser exploit guide
A comprehensive guide to bypassing security measures in Chakra browser vulnerabilities
Chakra vulnerability and exploit bypass all system mitigation
82 stars
4 watching
19 forks
last commit: over 6 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. | 25 |
| Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods | 6 |
| A knowledge base documenting exploit mitigations across various operating systems and software | 880 |
| Provides cheat sheets and guidance on bypassing browser XSS filters to inject malicious content into web pages | 1,116 |
| An in-depth exploration of browser exploitation techniques and vulnerability discovery | 446 |
| A collection of tips and tricks for using GDB-PEDA in exploit development | 16 |
| An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS | 404 |
| Lists publicly disclosed vulnerabilities in various cloud services. | 357 |
| Exploiting vulnerabilities in Microsoft's Spartan memory management system to bypass security features and gain unauthorized access | 26 |
| Exploiting Windows 10 x64 edge case on Microsoft Edge browser | 101 |
| Detects and exploits Blind Cross-site scripting (XSS) vulnerabilities to retrieve sensitive information and control user interactions. | 41 |
| Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. | 87 |
| A collection of tools and techniques for exploiting vulnerabilities in Google services | 45 |
| Provides a collection of leaked passwords compiled into ordered lists for analysis and use in security testing | 326 |
| A registry of known vulnerable web applications | 872 |