WinMin / awesome-vm-exploitLinks
share some useful archives about vm and qemu escape exploit.
☆550Updated last year
Alternatives and similar repositories for awesome-vm-exploit
Users that are interested in awesome-vm-exploit are comparing it to the libraries listed below
Sorting:
- Some pwn challenges selected for training and education.☆384Updated last year
- Windows Pwnable Study☆358Updated this week
- An updated collection of resources targeting browser-exploitation.☆819Updated 4 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆703Updated last month
- windows debug and exploit toolset for both user and kernel mode☆188Updated last week
- 💖CTF pwn framework.☆344Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆821Updated 5 years ago
- kernel-pwn and writeup collection☆624Updated last year
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆417Updated 2 months ago
- Script to setup pwn environment for CTF with Docker☆155Updated 3 years ago
- ☆224Updated 4 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- A collection of links related to VMware escape exploits☆1,438Updated 9 months ago
- For Linux binary Exploitation☆832Updated 7 years ago
- Winnie makes fuzzing Windows applications easy☆559Updated 2 years ago
- Basic pwntools for Windows☆263Updated 2 years ago
- A docker environment for pwn in ctf☆764Updated last year
- Kernel development & exploitation practice environment.☆232Updated last year
- won't maintain☆132Updated 6 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆537Updated 3 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆619Updated last month
- repository for kernel exploit practice☆398Updated 5 years ago
- 🔍Heap analysis tool for CTF pwn.☆223Updated 4 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆512Updated 11 months ago
- Collection of scripts and writeups☆323Updated 3 years ago
- Provide powerful tools for seccomp analysis☆1,041Updated last week
- How to build an efficient pwn development environment in 2020☆264Updated 4 years ago
- To store some CTF_pwn_bins and exploits for self-practice☆431Updated 4 years ago
- Some CTF write up☆246Updated 3 years ago
- CTF Reversing Challenges List☆276Updated 5 years ago