WinMin / awesome-vm-exploitLinks
share some useful archives about vm and qemu escape exploit.
☆550Updated last year
Alternatives and similar repositories for awesome-vm-exploit
Users that are interested in awesome-vm-exploit are comparing it to the libraries listed below
Sorting:
- Some pwn challenges selected for training and education.☆384Updated last year
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆820Updated 4 years ago
- An updated collection of resources targeting browser-exploitation.☆818Updated 4 years ago
- windows debug and exploit toolset for both user and kernel mode☆188Updated this week
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆697Updated 3 weeks ago
- Windows Pwnable Study☆353Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,432Updated 8 months ago
- 💖CTF pwn framework.☆344Updated 3 years ago
- kernel-pwn and writeup collection☆619Updated last year
- ☆223Updated 4 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆413Updated last month
- CTF Reversing Challenges List☆276Updated 5 years ago
- Script to setup pwn environment for CTF with Docker☆154Updated 3 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆615Updated 2 weeks ago
- Winnie makes fuzzing Windows applications easy☆558Updated 2 years ago
- My Chrome and Safari exploit code + write-up repo☆527Updated 3 years ago
- Kernel development & exploitation practice environment.☆231Updated last year
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,129Updated last year
- For Linux binary Exploitation☆832Updated 7 years ago
- Basic pwntools for Windows☆263Updated 2 years ago
- Various kernel exploits☆778Updated last year
- Collection of scripts and writeups☆323Updated 3 years ago
- repository for kernel exploit practice☆396Updated 5 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- To store some CTF_pwn_bins and exploits for self-practice☆430Updated 4 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆510Updated 11 months ago
- 🔍Heap analysis tool for CTF pwn.☆223Updated 4 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆750Updated 2 years ago
- ☆281Updated 5 years ago
- Web wrapper of niklasb/libc-database☆204Updated 6 months ago