Security Research & Exploit Development

Browser exploit chains, post-exploitation techniques, and security assessment tooling

Overview

This repository contains security research across browser exploit development, vulnerability analysis, and defensive security assessment. Research covers Chrome (V8, Blink, Skia, ANGLE) and Firefox (SpiderMonkey, Gecko) vulnerabilities from 2024-2026.

CVE Coverage
CVETargetTechniqueLevel
CVE-2024-0517Chrome V8Maglev OOB WriteACE
CVE-2024-1939Chrome V8Wasm S128 Type ConfusionACE
CVE-2024-5830Chrome V8Object Transition ConfusionACE
CVE-2024-9680FirefoxAnimation Timeline UAFUAF
CVE-2024-29943FirefoxJIT Range AnalysisARW
CVE-2025-4919FirefoxIonMonkey BCEARW
CVE-2025-13223Chrome V8Property Array ConfusionARW
CVE-2026-2441Chrome CSSFontFeatureValuesMap UAFUAF
CVE-2026-2795FirefoxWasm GC UAFACE
CVE-2026-3909Chrome SkiaGlyph Atlas OOB WriteOOB

ACE Arbitrary Code Execution   ARW Arbitrary Read/Write   UAF Use-After-Free Primitive   OOB Out-of-Bounds   Trigger Crash/PoC

Tools

Infectious I.D.O.L.

Invisible Deployment Orchestration Layer — 8-component educational worm PoC demonstrating credential harvest, CLI interception, persistence, lateral movement, C2 beaconing, polymorphic payload generation, and organizational spread. All components are read-only and non-destructive.

Win-Remote

Lightweight authenticated command relay for cross-platform exploit testing. HMAC-SHA256 auth, TLS, background command execution, file upload/download. Pure Python, zero dependencies.

Reports

Databricks Apps Security Assessment

12,500+ line Streamlit dashboard analyzing the Databricks Apps security model. Covers architecture gaps, attack scenarios, browser CVE implementations, obfuscation techniques, post-exploitation impact, and the I.D.O.L. worm architecture. Demonstrates why human-in-the-loop code review is the primary control for preventing malicious app deployment.

Open Interactive Dashboard → (runs in-browser via WebAssembly)

Documentation

Research methodology, patch analysis, exploit chain architecture, AI-accelerated exploit development pipeline, pre-exploitation obfuscation techniques, and post-exploitation impact analysis.

View on GitHub →

Disclaimer: This repository is for authorized security testing, defensive research, and educational purposes only. All exploit code targets specific, already-patched browser versions. Do not use against systems you do not own or have explicit authorization to test.