A curated list of awesome Windows Exploitation resources, and shiny things.
☆87Jul 24, 2017Updated 8 years ago
Alternatives and similar repositories for WindowsExploitation
Users that are interested in WindowsExploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last month
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- An ELF parser written fully in NASM.☆12Oct 20, 2025Updated 5 months ago
- ☆27May 4, 2018Updated 7 years ago
- 常用代码类☆13May 31, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Windows Offline Crash Dump☆17Aug 29, 2022Updated 3 years ago
- ☆23Jul 28, 2020Updated 5 years ago
- ☆201Jan 1, 2018Updated 8 years ago
- ☆24Apr 30, 2023Updated 2 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆415Jan 2, 2020Updated 6 years ago
- Load a dynamic library from memory using a fuse mount☆31Sep 15, 2023Updated 2 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 10 months ago
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆13Jun 26, 2021Updated 4 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- List of Awesome Advanced Windows Exploitation References☆1,553Jan 13, 2022Updated 4 years ago
- Some of my windows kernel exploits for learning purposes☆137May 18, 2022Updated 3 years ago
- 一个简单的用于win7 x64的驱动级HIPS☆57Mar 7, 2016Updated 10 years ago
- This project has been moved from a private repository☆26Jun 4, 2018Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- kAFL Fuzzer☆38Mar 16, 2026Updated 2 weeks ago
- ☆50Mar 21, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- StrongOD(anti anti-debug plugin) driver source code.☆127Oct 25, 2017Updated 8 years ago
- PoC for detecting and dumping process hollowing code injection☆53Oct 23, 2018Updated 7 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Resources for Windows exploit development☆1,651Dec 20, 2021Updated 4 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 7 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆49Feb 16, 2016Updated 10 years ago
- Injectable DLL that helps with debugging Wibu CodeMeter.☆23Nov 9, 2017Updated 8 years ago
- A Code highlighting plugin for OllyDbg 2.01.☆17Dec 10, 2014Updated 11 years ago
- C++ wrapers to simplify working with the JsRT interface to the Chakra JavaScript engine.☆16Nov 16, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆446Apr 11, 2025Updated 11 months ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆35Jul 10, 2024Updated last year
- ☆34Jul 28, 2018Updated 7 years ago
- ☆14Jul 26, 2025Updated 8 months ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago