Skip to content

Releases: Petitoto/chromium-exploit-dev

v1.1

16 Sep 23:56

Choose a tag to compare

Core changes

  • sbxMemory is now a dataview-like object covering the whole sandbox memory cage (1 TB).
  • Each script now runs in a global JavaScript context (using indirect eval instead of the previous custom __EVAL()). Introduced run() in main.js to run all included scripts in the same context at once.
  • Synchronous logging is now used on the testing webpage via WebSockets (replacing postMessage()). Added server.py to automatically serve files and the websocket server.

New features

  • Added rwx/helpers/partitionalloc-chrome.js to retrieve Chrome DLL and sandbox base addresses from PartitionAlloc metadata.

New exploits

Fixes

  • General improvements and fixes to enhance compatibility across versions and exploits.

Full Changelog: v1.0...v1.1

Chromium Exploit Development Toolkit v1.0

18 Jun 07:00

Choose a tag to compare

First public release:

  • provide a set of powerful scripts & tools for Chromium exploit development
  • support Google Chrome on Windows x64
  • include a demo exploit chain (CVE-2025-0291, 379140430, CVE-2024-11114)

Full Changelog: https://github.com/Petitoto/chromium-exploit-dev/commits/v1.0