|
You are here |
faraz.faith | ||
| | | | |
y4y.space
|
|
| | | | | Motivation I've been wanting to learn about V8 Pwn for quite a while for essentially no reason, but didn't have the opportunity to do so. Recently I happened to have some spare time to do free research, so I turned my attention to browser exploitation. I'd recommend readers to watch LiveOverflow's browser exploitation series before... | |
| | | | |
www.jaybosamiya.com
|
|
| | | | | In this challenge, we had to obtain remote code execution, simply by exploiting a 1-day bug that forgot the difference between -0 and +0. This has probably been one of the most difficult, fun, and frustrating bugs I have ever exploited. | |
| | | | |
leethax0.rs
|
|
| | | | | ||
| | | | |
int10h.org
|
|
| | | Font: DOS/V re. JPN30, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles | ||