Exploit-DB
exploit-db.com › exploits › 45048
JavaScript Core - Arbitrary Code Execution - Multiple local Exploit
July 11, 2018 - a[randomString()] = 1337; structs.push(a); } } // Here we will create our fake typed array and get arbitrary read/write // See http://www.phrack.org/papers/attacking_javascript_engines.html function getArb(prims) { sprayStructures() let utarget = new Uint8Array(0x10000); utarget[0] = 0x41; // Our fake array // Structure id guess is 0x200 // [ Indexing type = 0 ][ m_type = 0x27 (float array) ][ m_flags = 0x18 (OverridesGetOwnPropertySlot) ][ m_cellState = 1 (NewWhite)] let jscell = new Int64('0x0118270000000200'); // Construct the object // Each attribute will set 8 bytes of the fake object inl
Videos
01:42:24
Browser haxx0ring: Let's write an exploit for an integer overflow ...
31:11
Top 10 JavaScript Vulnerabilities (aka OWASP Top 10 for JavaScript ...
29:06
How Hackers can use Vulnerabilities to Exploit Your Website - JS ...
23:27
Worst JavaScript Flaws That Hackers Love To Abuse - YouTube
06:09
Website Hacking in 6 Minutes - YouTube
24:17
Hacker101 - JavaScript for Hackers (Created by @STOKfredrik) - YouTube
F-Secure
f-secure.com › v-descs › exploit-js-magnitudeek-g.shtml
Exploit:JS/MagnitudeEK.G | F-Secure
Exploit:JS/MagnitudeEK.G identifies JavaScript code that redirects users to malicious webpages hosting the Magnitude exploit kit.
Gitbooks
ckarande.gitbooks.io › owasp-nodegoat-tutorial › content › tutorial › a1_-_server_side_js_injection.html
Server Side JS Injection | OWASP NodeGoat Tutorial
When eval(), setTimeout(), setInterval(), Function()are used to process user provided inputs, it can be exploited by an attacker to inject and execute malicious JavaScript code on server.
GitHub
github.com › topics › exploit
exploit · GitHub Topics · GitHub
firefox exploit exploitation remote-code-execution cve-2019-9810 ... A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques · firefox apt exploit chain jit rpc pac wpad star shellcode double eop alpc cve-2020-0674 cve-2019-17026 darkhotel ... javascript ...
GitHub
github.com › theori-io › pwnjs
GitHub - theori-io/pwnjs: A Javascript library for browser exploitation
A Javascript library for browser exploitation. Contribute to theori-io/pwnjs development by creating an account on GitHub.
Starred by 891 users
Forked by 108 users
Languages JavaScript 100.0% | JavaScript 100.0%
PortSwigger
portswigger.net › daily-swig › remote-code-execution-vulnerability-exposed-in-popular-javascript-serialization-package
Remote code execution vulnerability exposed in popular JavaScript serialization package | The Daily Swig
June 18, 2021 - The advisory adds that the UID has a keyspace of approximately four billion, making exploitation a “realistic network attack”. The proof of concept below, for example, is able to call console.log() “when the `serialize()`d version is `eval()`d”. eval('('+ serialize({"foo": /1" + console.log(1)/i, "bar": '"@__R-<UID>-0__@'}) + ')'); The vulnerability is patched in serialize-javascript version 3.1.0 and has been resolved by contributors through changes to code ensuring placeholders are not preceded by a backslash.
OWASP Foundation
owasp.org › www-project-web-security-testing-guide › v41 › 4-Web_Application_Security_Testing › 11-Client_Side_Testing › 02-Testing_for_JavaScript_Execution
Testing for JavaScript Execution
This implies that an attacker could inject JavaScript code simply by submitting the following query string: www.victim.com/?javascript:alert(1).
F-Secure
f-secure.com › v-descs › exploit-js-agent-ihl.shtml
Exploit:JS/Agent.IHL | F-Secure
Exploit:JS/Agent.IHL is JavaScript code that exploits a vulnerability found in versions of Microsoft Internet Explorer.
Ret2
browser.training.ret2.systems › content › module_1 › 3_javascript › javascript
JavaScript Fundamentals
JavaScript> 0x4142434445464748.toString(16) 4142434445464800 · When writing an exploit, we will often abuse doubles to pull off a type confusion.
GitHub
gist.github.com › itszn › 5e6354ff7975e65e5867f3a660e23e05
Exploit for JavascriptCore CVE-2018-4192 · GitHub
Exploit for JavascriptCore CVE-2018-4192. GitHub Gist: instantly share code, notes, and snippets.
OWASP Foundation
owasp.org › www-community › attacks › xss
Cross Site Scripting (XSS) | OWASP Foundation
Attackers would include JavaScript in their guestbook entries, and all subsequent visitors to the guestbook page would execute the malicious code. As the examples demonstrate, XSS vulnerabilities are caused by code that includes unvalidated data in an HTTP response. There are three vectors by which an XSS attack can reach a victim: As in Example 1, data is read directly from the HTTP request and reflected back in the HTTP response. Reflected XSS exploits ...
PortSwigger
portswigger.net › web-security › cross-site-scripting › exploiting
Exploiting cross-site scripting vulnerabilities | Web Security Academy
You can exploit cross-site scripting vulnerabilities to send the victim's cookies to your own domain, then manually inject the cookies into the browser and impersonate the victim. In practice, this approach has some significant limitations: The victim might not be logged in. Many applications hide their cookies from JavaScript using the HttpOnly flag.
StationX
stationx.net › home › javascript for hacking made easy: expert guide
JavaScript for Hacking Made Easy: Expert Guide
November 17, 2025 - First, this HTML file assigns the form to follow with an ID as ‘exploit-form’ and then defines the JavaScript function submit() to submit the form as POST when called. All of this is done in the head of the file. The form itself replicates the code that we took from the developer console earlier when we identified the form field we want to exploit (this is the forged request on behalf of the authenticated user).