Published onApril 11, 2026V8 Exploitation: From Libc Pwn to Browser BugsPWNV8Browser-ExploitationCTFA practical guide to getting into V8 and browser exploitation, coming from classic libc-based pwn. Covering the mental model, debug environment, core primitives, and what surprised me along the way.