Let's get familiar with Windows pwn 😎
☆61Feb 24, 2020Updated 6 years ago
Alternatives and similar repositories for Windows-Pwn-Step-by-Step
Users that are interested in Windows-Pwn-Step-by-Step are comparing it to the libraries listed below
Sorting:
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- ☆153Jan 6, 2019Updated 7 years ago
- 這份筆記是關於 Angelboy 2022 年在臺灣好厲駭開的 Windows Binary Exploitation 課程,內含個人撰寫的解題腳本、課堂筆記、以及自行設計的課堂練習題和架設腳本☆87Nov 20, 2024Updated last year
- Some examples of anti debug techniques used in malware or commercial products preventing analysts to debug code of app.☆22Apr 18, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/idapython☆20Apr 14, 2015Updated 10 years ago
- CTF write-up☆35Jan 11, 2024Updated 2 years ago
- ☆20Sep 15, 2023Updated 2 years ago
- a ringcon based IDA Pro controller☆72Jan 26, 2024Updated 2 years ago
- My CTF Challenge☆11Feb 5, 2026Updated last month
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- repo about binary exploitation☆12Dec 5, 2023Updated 2 years ago
- Free and open binary exploitation course for 2024 NCKUCTF☆44Oct 2, 2024Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- attachments and (some) writeups/source code for RWCTF 6th☆125Feb 2, 2024Updated 2 years ago
- Binary Only Thread Sanitizer☆18Aug 10, 2024Updated last year
- 分布式系统之网络篇,TCPIP、HTTP、WebSocket、SDN 等。☆13Nov 8, 2025Updated 3 months ago
- Process Creation, Image Load and Thread Creation Notification☆13Sep 15, 2023Updated 2 years ago
- Fuzzing tutorial with easy-to-learn labs 🚀☆165Sep 4, 2022Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- Windows KASLR bypass using prefetch side-channel☆178Apr 26, 2024Updated last year
- 2021 交大程式安全 binary exploit 課程教材☆303Jun 4, 2024Updated last year
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- C++ Alt syscall hook in 25h2 can be load by KDU☆25Feb 18, 2026Updated 2 weeks ago
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- Space Heroes CTF was an online jeopardy style Capture the Flag competition that our FITSEC Team From Florida Tech host April 1st-April 3r…☆14Apr 5, 2022Updated 3 years ago
- Windows Pwnable Study☆408Jun 16, 2025Updated 8 months ago
- ☆46Sep 22, 2025Updated 5 months ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Jun 28, 2024Updated last year
- windows debug and exploit toolset for both user and kernel mode☆193Jun 12, 2025Updated 8 months ago
- Collection of browser challenges☆140May 3, 2021Updated 4 years ago
- ☆21Nov 3, 2018Updated 7 years ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- kernel-pwn and writeup collection☆700Oct 2, 2023Updated 2 years ago