pwn2own2020

Browser Exploitation

An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS

Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities

GitHub

404 stars
37 watching
58 forks
Language: C++
last commit: almost 4 years ago
exploitmacospwn2ownsafari

Related projects:

Repository Description Stars
rpwnage/pwn-my Exploits a vulnerability in iOS 14.5 WebKit to gain jailbreak access 649
exp-sky/hitcon-2014-ie-11-0day-windows-8.1-exploit An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. 25
urule99/jsunpack-n A tool designed to emulate browser behavior and detect vulnerabilities in web-based exploits 163
demi6od/smashing_the_browser An in-depth exploration of browser exploitation techniques and vulnerability discovery 446
spencerdodd/kernelpop Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. 687
theori-io/zer0con2018_singi An exploit demonstrating code execution vulnerabilities in macOS Sierra using Safari and WindowServer 121
snyk-labs/exploit-workshop An interactive workshop to teach exploitation techniques using real-world vulnerabilities in Node.js and Java applications. 156
stephenbradshaw/vulnserver A tool designed to help developers learn how to find and exploit buffer overflow bugs in software 1,011
r0075h3ll/oralyzer A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. 758
pyroxenites/boftools A collection of tools and techniques for exploiting vulnerabilities in software applications. 17
siguza/v0rtex An exploit tool for iOS Surface vulnerabilities 218
firebasky/csrouge A tool that exploits vulnerabilities in web servers to execute arbitrary code 9
scumjr/dirtycow-vdso A Proof-of-Concept for exploiting a vulnerability in the Linux vDSO, allowing arbitrary code execution. 492
openscanner/xguardian A security scanner for OSX applications that detects potential vulnerabilities in URL scheme hijack, bundle ID hijack, and keychain hijack. 41
arimogi/google-dorks A collection of tools and techniques for exploiting vulnerabilities in Google services 45