- JavaScript Engine Fuzzing and Exploitation Reading List https://zon8.re/posts/javascript-engine-fuzzing-and-exploitation-reading-list/ 4 comments netsec
Linking pages
Linked pages
- Pointer Compression in V8 https://blog.infosectcbr.com.au/2020/02/pointer-compression-in-v8.html 71 comments
- Exploiting the Math.expm1 typing bug in V8 | 0x41414141 in ?? () https://abiondo.me/2019/01/02/exploiting-math-expm1-v8/ 45 comments
- Project Zero: The Great DOM Fuzz-off of 2017 https://googleprojectzero.blogspot.com/2017/09/the-great-dom-fuzz-off-of-2017.html 29 comments
- https://leethax0.rs/2021/04/electricchrome/ 27 comments
- Exploiting Chrome V8: Krautflare (35C3 CTF 2018) · Jay Bosamiya https://www.jaybosamiya.com/blog/2019/01/02/krautflare/ 17 comments
- Pwn2Own: Safari sandbox part 1 â Mount yourself a root shell - phoenhex team https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc 14 comments
- Project Zero: 365 Days Later: Finding and Exploiting Safari Bugs using Publicly Available Tools https://googleprojectzero.blogspot.com/2018/10/365-days-later-finding-and-exploiting.html 14 comments
- Mobile PWN2OWN Autumn 2013 - Chrome on Android - Exploit Writeup - Google Docs https://docs.google.com/document/d/1tHElG04AJR5OR2Ex-m_Jsmc8S5fAbRB3s4RmTG_PFnw/edit 11 comments
- OmahaProxy - Google Chrome http://omahaproxy.appspot.com/ 10 comments
- Project Zero: JITSploitation I: A JIT Bug https://googleprojectzero.blogspot.com/2020/09/jitsploitation-one.html 10 comments
- http://phrack.org/papers/jit_exploitation.html 10 comments
- Zero Day Initiative — But You Told Me You Were Safe: Attacking the Mozilla Firefox Renderer (Part 1) https://www.zerodayinitiative.com/blog/2022/8/17/but-you-told-me-you-were-safe-attacking-the-mozilla-firefox-renderer-part-1 9 comments
- Exploiting a V8 OOB write. https://halbecaf.com/2017/05/24/exploiting-a-v8-oob-write/ 8 comments
- 32 bits, 32 gigs, 1 click... | RET2 Systems Blog https://blog.ret2.io/2021/06/02/pwn2own-2021-jsc-exploit/ 7 comments
- A Methodical Approach to Browser Exploitation | RET2 Systems Blog https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/ 7 comments
- http://www.phrack.org/papers/attacking_javascript_engines.html 5 comments
- Timeless Debugging of Complex Software | RET2 Systems Blog https://blog.ret2.io/2018/06/19/pwn2own-2018-root-cause-analysis/ 4 comments
- https://perception-point.io/resources/research/cve-2019-0539-exploitation/ 4 comments
- Introduction to TurboFan https://doar-e.github.io/blog/2019/01/28/introduction-to-turbofan/ 4 comments
- GitHub - saelo/pwn2own2018: A Pwn2Own exploit chain https://github.com/saelo/pwn2own2018 4 comments
Would you like to stay up to date with Web Development? Checkout Web Development
Weekly.
Related searches:
Search whole site: site:zon8.re
Search title: JavaScript Engine Fuzzing and Exploitation Reading List [Updated 2022] :: Zon8 Research — Vulnerability research journal.
See how to search.