A curated list of awesome Windows Exploitation resources, and shiny things.
☆87Jul 24, 2017Updated 8 years ago
Alternatives and similar repositories for WindowsExploitation
Users that are interested in WindowsExploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last month
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- An ELF parser written fully in NASM.☆12Oct 20, 2025Updated 5 months ago
- ☆27May 4, 2018Updated 7 years ago
- 常用代码类☆13May 31, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Windows Offline Crash Dump☆17Aug 29, 2022Updated 3 years ago
- ☆24Jul 28, 2020Updated 5 years ago
- ☆200Jan 1, 2018Updated 8 years ago
- ☆24Apr 30, 2023Updated 2 years ago
- Load a dynamic library from memory using a fuse mount☆32Sep 15, 2023Updated 2 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆416Jan 2, 2020Updated 6 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 10 months ago
- Here I store my proof of concepts☆15Sep 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Jun 26, 2021Updated 4 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- List of Awesome Advanced Windows Exploitation References☆1,557Jan 13, 2022Updated 4 years ago
- 一个简单的用于win7 x64的驱动级HIPS☆57Mar 7, 2016Updated 10 years ago
- Some of my windows kernel exploits for learning purposes☆137May 18, 2022Updated 3 years ago
- This project has been moved from a private repository☆26Jun 4, 2018Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- kAFL Fuzzer☆37Mar 16, 2026Updated last month
- ☆50Mar 21, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- StrongOD(anti anti-debug plugin) driver source code.☆124Oct 25, 2017Updated 8 years ago
- PoC for detecting and dumping process hollowing code injection☆53Oct 23, 2018Updated 7 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Resources for Windows exploit development☆1,650Dec 20, 2021Updated 4 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 8 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆49Feb 16, 2016Updated 10 years ago
- Injectable DLL that helps with debugging Wibu CodeMeter.☆23Nov 9, 2017Updated 8 years ago
- A Code highlighting plugin for OllyDbg 2.01.☆17Dec 10, 2014Updated 11 years ago
- C++ wrapers to simplify working with the JsRT interface to the Chakra JavaScript engine.☆16Nov 16, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆448Apr 11, 2025Updated last year
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆35Jul 10, 2024Updated last year
- ☆14Jul 26, 2025Updated 8 months ago
- ☆34Jul 28, 2018Updated 7 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago