Byzero512 / winpwnLinks
windows debug and exploit toolset for both user and kernel mode
☆190Updated 4 months ago
Alternatives and similar repositories for winpwn
Users that are interested in winpwn are comparing it to the libraries listed below
Sorting:
- ☆226Updated 4 years ago
- A plugin to resolve .plt.sec symbols in IDA☆78Updated 4 years ago
- ☆297Updated 3 years ago
- won't maintain☆133Updated 6 years ago
- Script to setup pwn environment for CTF with Docker☆155Updated 4 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆47Updated 2 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Updated 8 years ago
- ☆175Updated 6 years ago
- Corpus of public v8 vulnerability PoCs.☆218Updated 4 years ago
- ☆52Updated last year
- Web wrapper of niklasb/libc-database☆209Updated 11 months ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Updated 4 years ago
- The learn note of Angr-CTF ..☆48Updated 6 years ago
- ctf patching toy☆48Updated 11 months ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆52Updated 8 years ago
- Something about AEG☆269Updated 6 years ago
- ☆102Updated 4 years ago
- ☆52Updated 3 years ago
- 💖CTF pwn framework.☆342Updated 3 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆31Updated 6 years ago
- Alphanumeric shellcode encoder.☆165Updated 9 years ago
- Some pwn challenges selected for training and education.☆386Updated 2 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆173Updated 3 years ago
- Tool that converts All of libc to signatures for IDA Pro FLIRT Plugin. and utility make sig with FLAIR easily☆167Updated 2 years ago
- Debug pwn in docker, no need for virtual machines☆37Updated 2 weeks ago
- basic amd64 alphanumeric shellcode encoder☆194Updated last year
- Write-ups from A*0*E.☆198Updated 5 years ago
- ☆19Updated 11 months ago
- Automatic Exploit Generation Paper☆90Updated 3 years ago
- CTF challenges writeup☆183Updated 7 months ago