Security Research & Exploit Development

Browser exploit chain development, red-team tooling, and security assessment — with full containment.

Overview

This repository covers end-to-end offensive security research: vulnerability reproduction, exploit primitive development, exploit chain orchestration, post-exploitation tradecraft, and security assessment deliverables. Research targets Chrome (V8, Blink, Skia, ANGLE) and Firefox (SpiderMonkey, Gecko IPC, WebAssembly) across 2024–2026.

All CVEs reproduced here were already publicly disclosed and had published proof-of-concept code at the time of research. The contribution is primitive building, chaining, and delivery infrastructure — not novel vulnerability discovery. No zero-days are included or implied.

CVE Coverage — publicly disclosed, patched, published PoC
CVETargetTechniqueLevel
CVE-2024-0517Chrome V8 MaglevOOB WriteACE
CVE-2024-1939Chrome V8 Wasm S128Type ConfusionACE
CVE-2024-5830Chrome V8 Object TransitionsType ConfusionACE
CVE-2024-8381Firefox SpiderMonkeyType ConfusionTrigger
CVE-2024-9680Firefox AnimationTimelineUAFUAF
CVE-2024-29943Firefox JIT Range AnalysisBounds Check ElimARW
CVE-2024-29944Firefox Privileged JSSandbox EscapeACE
CVE-2025-2857Firefox IPCSandbox EscapeTrigger
CVE-2025-4918Firefox PromiseOOBOOB
CVE-2025-4919Firefox IonMonkey BCEOOB → ARWARW
CVE-2025-5959Chrome Wasm JSPISandbox EscapeACE
CVE-2025-6558Chrome ANGLE WebGL2UAFUAF
CVE-2025-13223Chrome V8 Property ArrayType ConfusionARW
CVE-2026-2441Chrome CSS FontFeatureValuesMapUAFUAF
CVE-2026-2795Firefox Wasm GCUAF → ACEACE
CVE-2026-2796Firefox Wasm JITType ConfusionTrigger
CVE-2026-3909Chrome Skia Glyph AtlasOOB WriteOOB

ACE Arbitrary Code Execution   ARW Arbitrary Read/Write   UAF Use-After-Free Primitive   OOB Out-of-Bounds   Trigger Crash/PoC

Tooling

C2 Server & Beacon

HTTP-based C2 with analytics-style traffic mimicry. Flask operator API, session tracking, task dispatch. Beacon client with jitter algorithms (uniform, gaussian, exponential, working-hours, burst-sleep). 8-command hardcoded allowlist.

Loopback-only · ContainmentGuard enforced · Rust binary port available

Browser Exploit Framework

FuzzBunch-inspired orchestration with YAML module configs, chain builder, and go/no-go validation gates. Exploit server serves CVE HTML/JS from the repo, receives post-exploitation callbacks, and integrates with the C2 server.

Requires explicit --exploit-server flag · All chains logged

Infectious I.D.O.L.

9-component educational worm PoC: credential harvest, CLI interception, persistence, lateral movement, C2 beaconing, and polymorphic payload generation. Demonstrates organizational spread patterns for stakeholder awareness.

Read-only filesystem ops · Persistence demo is a harmless cron heartbeat

Target Validator

DoubleFantasy/MistyVeal-style pre-exploitation target fingerprinting. Browser version detection, webdriver and DevTools detection, screen geometry analysis, patch-level assessment. Go/no-go gating for the exploit chain.

Recon only · No exploit delivery

Post-Exploit Staging

DoublePulsar-inspired three-tier architecture: exploit → stager → payload. Reflective JavaScript loader with three loading strategies. Clean separation between delivery and payload so each tier is independently replaceable.

In-memory only · No disk writes

Session Dashboard

TURBINE-style operator console. Simulated demo mode (--demo) for presentations; live mode (--c2 <url>) connects to the real C2 server for task dispatch and event monitoring. WASM version runs fully in-browser.

WASM build: simulated data only, no C2 connectivity

Forensic Analysis

EventLogEdit-inspired artifact detection, audit gap analysis, and log parsing. Identifies what traces post-exploitation activity leaves — and where defenders have blind spots. Useful for both red and blue teams.

Read-only · No system modification

Fuzzing Harnesses

JavaScript fuzzers targeting JIT compiler phases (GVN, LICM, Range Analysis), IPC message routing, and V8 Turbofan optimization passes. Structured mutation with coverage feedback hooks.

Targets patched/local builds only

Rust Target Tools

Compiled ports of the beacon client, ContainmentGuard, and jitter library. 4.7MB static binary, zero runtime dependencies. Designed for deployment to target environments without a Python runtime.

54 tests across 3 crates · cargo build --release

Win-Remote

Lightweight authenticated command relay for cross-platform exploit testing. HMAC-SHA256 auth, TLS, background command execution, file transfer. Pure Python, zero dependencies.

Requires explicit .env configuration

Containment & Safety Architecture

All tools enforce containment in code — not by convention or documentation alone. The following controls are active at runtime:

NETWORK

All C2 and beacon traffic is restricted to loopback (127.0.0.0/8) or Docker bridge. ContainmentGuard checks the bind address at startup and refuses to run if a non-loopback interface is requested.

EXEC

The beacon's exec command is refused outside Docker containers. All other commands are drawn from a hardcoded allowlist of 8 safe operations. There is no dynamic command registration.

LAB

The Docker Compose lab runs on an internal: true network with no internet gateway. Services are: C2 server, 2 beacons, exploit server, 2 simulated target apps.

IDOL

The IDOL worm's persistence demo installs only a harmless cron heartbeat entry. --cleanup removes it. Credential harvest and recon scripts are read-only and do not exfiltrate data.

WASM

The in-browser session dashboard runs on simulated data generated locally. There is no real C2 server behind it, no outbound HTTP, and no network access from the WASM sandbox. The --c2 live mode is only available in the local CLI version.

CVEs

All reproduced CVEs target specific patched browser versions — they do not run against current releases. Exploit code is validated inside Docker containers running pinned, outdated browser builds.

Reports

Databricks Apps Security Assessment

Authorized red-team assessment evaluating the Databricks Apps platform under production conditions with no human-in-the-loop code review. The deliverable is an interactive Streamlit dashboard covering architecture gaps, attack scenarios, obfuscation techniques, post-exploitation impact, and the I.D.O.L. worm architecture. Audience: non-technical C-suite stakeholders evaluating governance controls.

Open Interactive Dashboard → (runs in-browser via WebAssembly — simulated data, no live C2)

Snowflake Platform Security Assessment

Red-team assessment of the Snowflake data-cloud platform. Attack chains A–I cover credential theft (UNC5537 pattern), Cortex AI prompt-injection to code execution (CVE-2026-6442), Native Apps Marketplace supply-chain risk, federated-IdP compromise, cross-cloud Storage Integration pivots, post-MFA key-pair JWT abuse, Direct Share / replication exfil, SPCS over-broad egress, and MCP tool poisoning against Cortex Agents. Companion PoC tooling (loopback-mocked, end-to-end runnable), SIEM-side detection rules (Sigma / KQL / SPL), and a Cortex Guardrails FP/FN harness ship in the repo. Field-by-field mapping of Snowflake Trail vs ACCOUNT_USAGE lives in the analytical companion.

Open Assessment Report →

Documentation

Research methodology, patch analysis, exploit chain architecture, AI-accelerated exploit development pipeline, pre-exploitation obfuscation, post-exploitation impact analysis, and threat scenario playbooks.

View on GitHub →    Security Policy →

Authorization: All research was conducted under explicit written authorization. CVE reproductions target already-patched browser versions using techniques derived from publicly available proof-of-concept code. No zero-days are published here. Do not use any code or technique against systems you do not own or have explicit written authorization to test. See SECURITY.md for the full responsible disclosure policy.