LJP-TW / Windows-Pwn-Step-by-Step
Let's get familiar with Windows pwn π
β45Updated 5 years ago
Alternatives and similar repositories for Windows-Pwn-Step-by-Step:
Users that are interested in Windows-Pwn-Step-by-Step are comparing it to the libraries listed below
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~β35Updated 4 years ago
- a new class of file structure attacksβ50Updated 2 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.β221Updated 4 months ago
- Linux kernel module implementation & exploitation (pwn) labs.β191Updated 3 years ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.β59Updated 8 months ago
- β73Updated last year
- Repo for talk slides & materialsβ18Updated 5 months ago
- Collection of browser challengesβ130Updated 3 years ago
- CTF write-upβ34Updated last year
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to β¦β170Updated this week
- β35Updated 11 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )β63Updated 9 months ago
- β115Updated last year
- Include CVE vulnerability analyzeοΌ ctf pwn and documents for Browser-pwnβ183Updated 4 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTFβ73Updated 2 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypassβ42Updated 2 years ago
- β109Updated 5 months ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)β78Updated 10 months ago
- My solutions for CTF challengesβ69Updated 3 months ago
- β29Updated last year
- Notes and challenges from the HeapLAB course taught by Max Kamper.β20Updated 3 years ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTFβ18Updated 8 months ago
- A tool for automating setup of kernel pwn challengesβ55Updated 5 months ago
- θ©¦θ©¦δ½ ηε₯½ζζ°£β34Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.β98Updated 2 months ago
- β195Updated last week
- Exploit for Real World CTF 6th RIPTC.β33Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVβ¦β226Updated 2 years ago
- β70Updated last year
- β18Updated last year