WinMin / awesome-vm-exploit
share some useful archives about vm and qemu escape exploit.
☆542Updated 11 months ago
Alternatives and similar repositories for awesome-vm-exploit:
Users that are interested in awesome-vm-exploit are comparing it to the libraries listed below
- Some pwn challenges selected for training and education.☆382Updated last year
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆673Updated 2 months ago
- Windows Pwnable Study☆337Updated 4 years ago
- An updated collection of resources targeting browser-exploitation.☆814Updated 4 years ago
- kernel-pwn and writeup collection☆600Updated last year
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆817Updated 4 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆401Updated 4 years ago
- 💖CTF pwn framework.☆344Updated 2 years ago
- windows debug and exploit toolset for both user and kernel mode☆182Updated 6 months ago
- Kernel development & exploitation practice environment.☆223Updated last year
- ☆222Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,410Updated 6 months ago
- repository for kernel exploit practice☆396Updated 5 years ago
- 🔍Heap analysis tool for CTF pwn.☆221Updated 3 years ago
- Linux Heap Exploitation Practice☆378Updated 6 years ago
- For Linux binary Exploitation☆829Updated 6 years ago
- Script to setup pwn environment for CTF with Docker☆152Updated 3 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆745Updated 2 years ago
- Winnie makes fuzzing Windows applications easy☆552Updated 2 years ago
- To store some CTF_pwn_bins and exploits for self-practice☆424Updated 4 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆507Updated 8 months ago
- CTF Reversing Challenges List☆273Updated 5 years ago
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- Something about AEG☆265Updated 5 years ago
- Collection of scripts and writeups☆320Updated 3 years ago
- Provide powerful tools for seccomp analysis☆1,023Updated this week
- Various kernel exploits☆772Updated last year
- How to build an efficient pwn development environment in 2020☆260Updated 4 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆597Updated 2 months ago
- Android Kernel Exploitation☆606Updated 3 years ago