AsiaSecWest-2018-Chakra-vulnerability-and-exploit-bypass-all-system-mitigation
Browser exploit guide
A comprehensive guide to bypassing security measures in Chakra browser vulnerabilities
Chakra vulnerability and exploit bypass all system mitigation
82 stars
4 watching
19 forks
last commit: over 7 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. | 25 |
| | Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods | 6 |
| | A knowledge base documenting exploit mitigations across various operating systems and software | 880 |
| | Provides cheat sheets and guidance on bypassing browser XSS filters to inject malicious content into web pages | 1,116 |
| | An in-depth exploration of browser exploitation techniques and vulnerability discovery | 446 |
| | A collection of tips and tricks for using GDB-PEDA in exploit development | 16 |
| | An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS | 404 |
| | Lists publicly disclosed vulnerabilities in various cloud services. | 357 |
| | Exploiting vulnerabilities in Microsoft's Spartan memory management system to bypass security features and gain unauthorized access | 26 |
| | Exploiting Windows 10 x64 edge case on Microsoft Edge browser | 101 |
| | Detects and exploits Blind Cross-site scripting (XSS) vulnerabilities to retrieve sensitive information and control user interactions. | 41 |
| | Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. | 87 |
| | A collection of tools and techniques for exploiting vulnerabilities in Google services | 45 |
| | Provides a collection of leaked passwords compiled into ordered lists for analysis and use in security testing | 326 |
| | A registry of known vulnerable web applications | 872 |