In my previous post “Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals”, we took our first deep dive into the world of browser exploitation by covering a few complex topics that were necessary for fundamental knowledge. We mainly covered topics on how JavaScript and V8 worked under the hood by exploring what objects, maps and shapes were, how these objects were structured in memory, and we also covered some basic memory optimizations such as pointer tagging ...| Jack Hacks
Frequently updated reading list for V8 and Chrome architecture tailored for security researchers. [Updated 2022]| zon8.re
Personal website of Benedikt Meurer, JavaScript Engine Hacker and Programming Language Enthusiast.| benediktmeurer.de