LJP-TW / Windows-Pwn-Step-by-StepLinks
Let's get familiar with Windows pwn π
β46Updated 5 years ago
Alternatives and similar repositories for Windows-Pwn-Step-by-Step
Users that are interested in Windows-Pwn-Step-by-Step are comparing it to the libraries listed below
Sorting:
- Writeups for CTFsβ73Updated 3 weeks ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~β36Updated 4 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.β226Updated 6 months ago
- β110Updated 8 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploitsβ143Updated 3 weeks ago
- A tool for automating setup of kernel pwn challengesβ58Updated last month
- Collection of browser challengesβ137Updated 4 years ago
- Linux & Android Kernel Vulnerability research and exploitationβ47Updated last year
- Include CVE vulnerability analyzeοΌ ctf pwn and documents for Browser-pwnβ186Updated 4 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to β¦β187Updated last month
- ASLR bypass without infoleakβ162Updated 3 years ago
- Repo for talk slides & materialsβ19Updated 7 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )β74Updated last week
- β124Updated 2 years ago
- Linux kernel module implementation & exploitation (pwn) labs.β195Updated 3 years ago
- a new class of file structure attacksβ53Updated 2 years ago
- β46Updated last year
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.β71Updated 10 months ago
- β126Updated 8 months ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTFβ18Updated 10 months ago
- β223Updated last month
- A Linux Kernel Exploitation C Libraryβ14Updated last month
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).β82Updated 7 months ago
- β35Updated last year
- My solutions for CTF challengesβ72Updated last month
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.β103Updated 5 months ago
- My browser pwn collections. Mainly JavaScript engine stuff.β27Updated 5 months ago
- CTFs and solutions for Linux binary exploitation.β110Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypassβ43Updated 3 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVβ¦β229Updated 2 years ago