LJP-TW / Windows-Pwn-Step-by-StepView external linksLinks
Let's get familiar with Windows pwn π
β61Feb 24, 2020Updated 5 years ago
Alternatives and similar repositories for Windows-Pwn-Step-by-Step
Users that are interested in Windows-Pwn-Step-by-Step are comparing it to the libraries listed below
Sorting:
- A Linux Kernel Exploitation C Libraryβ19Oct 29, 2025Updated 3 months ago
- β154Jan 6, 2019Updated 7 years ago
- ιδ»½ηθ¨ζ―ιζΌ Angelboy 2022 εΉ΄ε¨θΊη£ε₯½ε²ι§ιη Windows Binary Exploitation θͺ²η¨οΌε §ε«εδΊΊζ°ε―«ηθ§£ι‘θ ³ζ¬γθͺ²ε ηθ¨γδ»₯εθͺθ‘θ¨θ¨ηθͺ²ε η·΄ηΏι‘εζΆθ¨θ ³ζ¬β87Nov 20, 2024Updated last year
- Some examples of anti debug techniques used in malware or commercial products preventing analysts to debug code of app.β22Apr 18, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/idapythonβ20Apr 14, 2015Updated 10 years ago
- β19Sep 15, 2023Updated 2 years ago
- a ringcon based IDA Pro controllerβ72Jan 26, 2024Updated 2 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeupβ10May 3, 2023Updated 2 years ago
- My CTF Challengeβ11Feb 5, 2026Updated last week
- repo about binary exploitationβ12Dec 5, 2023Updated 2 years ago
- I am still working on itβ12Apr 30, 2020Updated 5 years ago
- Free and open binary exploitation course for 2024 NCKUCTFβ43Oct 2, 2024Updated last year
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..β14Aug 31, 2017Updated 8 years ago
- A cross platform framework to recover driver's communication interface.β11Mar 26, 2021Updated 4 years ago
- Linux kernel and browser exploit scripts for ctf challengesβ15Apr 24, 2025Updated 9 months ago
- attachments and (some) writeups/source code for RWCTF 6thβ125Feb 2, 2024Updated 2 years ago
- εεΈεΌη³»η»δΉη½η»η―οΌTCPIPγHTTPγWebSocketγSDN ηγβ13Nov 8, 2025Updated 3 months ago
- Process Creation, Image Load and Thread Creation Notificationβ13Sep 15, 2023Updated 2 years ago
- Fuzzing tutorial with easy-to-learn labs πβ163Sep 4, 2022Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliabilityβ91May 12, 2022Updated 3 years ago
- CTF Writeups Backupβ13Nov 4, 2024Updated last year
- Windows KASLR bypass using prefetch side-channelβ175Apr 26, 2024Updated last year
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)β39May 6, 2024Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).β102Jan 13, 2026Updated last month
- Security research helper for CLFS driversβ16Sep 5, 2024Updated last year
- This is a scanning tools for AIS3 project in group 7β18Aug 3, 2025Updated 6 months ago
- Windows Pwnable Studyβ405Jun 16, 2025Updated 7 months ago
- β46Sep 22, 2025Updated 4 months ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcacheβ41Jun 28, 2024Updated last year
- windows debug and exploit toolset for both user and kernel modeβ193Jun 12, 2025Updated 8 months ago
- β21Nov 3, 2018Updated 7 years ago
- Collected resources for OSWA preparation.β25Jan 25, 2023Updated 3 years ago
- Collection of browser challengesβ139May 3, 2021Updated 4 years ago
- kernel-pwn and writeup collectionβ693Oct 2, 2023Updated 2 years ago
- Linux kernel module implementation & exploitation (pwn) labs.β211Jan 26, 2022Updated 4 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesomβ78Jan 30, 2020Updated 6 years ago
- β17Dec 1, 2022Updated 3 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~β36Nov 21, 2020Updated 5 years ago
- PAWNYABLE!β234May 30, 2024Updated last year