Releases: Petitoto/chromium-exploit-dev
Releases · Petitoto/chromium-exploit-dev
v1.1
Core changes
- sbxMemory is now a dataview-like object covering the whole sandbox memory cage (1 TB).
- Each script now runs in a global JavaScript context (using indirect eval instead of the previous custom
__EVAL()). Introducedrun()inmain.jsto run all included scripts in the same context at once. - Synchronous logging is now used on the testing webpage via WebSockets (replacing
postMessage()). Addedserver.pyto automatically serve files and the websocket server.
New features
- Added
rwx/helpers/partitionalloc-chrome.jsto retrieve Chrome DLL and sandbox base addresses from PartitionAlloc metadata.
New exploits
- CVE-2024-7971
- CVE-2025-2135
- CVE-2025-5419
- Issue 352689356
- Issue 395659804
- Issue 421403261
Fixes
- General improvements and fixes to enhance compatibility across versions and exploits.
Full Changelog: v1.0...v1.1
Chromium Exploit Development Toolkit v1.0
First public release:
- provide a set of powerful scripts & tools for Chromium exploit development
- support Google Chrome on Windows x64
- include a demo exploit chain (CVE-2025-0291, 379140430, CVE-2024-11114)
Full Changelog: https://github.com/Petitoto/chromium-exploit-dev/commits/v1.0