WinMin / awesome-vm-exploitLinks
share some useful archives about vm and qemu escape exploit.
☆550Updated last year
Alternatives and similar repositories for awesome-vm-exploit
Users that are interested in awesome-vm-exploit are comparing it to the libraries listed below
Sorting:
- Some pwn challenges selected for training and education.☆384Updated 2 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆707Updated 2 months ago
- 💖CTF pwn framework.☆343Updated 3 years ago
- windows debug and exploit toolset for both user and kernel mode☆189Updated last month
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆827Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆817Updated 4 years ago
- Windows Pwnable Study☆360Updated 3 weeks ago
- ☆224Updated 4 years ago
- won't maintain☆132Updated 6 years ago
- kernel-pwn and writeup collection☆631Updated last year
- Script to setup pwn environment for CTF with Docker☆155Updated 3 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆419Updated 3 months ago
- Web wrapper of niklasb/libc-database☆205Updated 7 months ago
- Kernel development & exploitation practice environment.☆232Updated last year
- My Chrome and Safari exploit code + write-up repo☆529Updated 3 years ago
- repository for kernel exploit practice☆401Updated 5 years ago
- 🔍Heap analysis tool for CTF pwn.☆223Updated 4 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆538Updated 3 years ago
- Basic pwntools for Windows☆263Updated 2 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆512Updated last year
- A docker environment for pwn in ctf☆765Updated last year
- ☆293Updated 3 years ago
- ☆332Updated 3 years ago
- Something about AEG☆269Updated 6 years ago
- To store some CTF_pwn_bins and exploits for self-practice☆430Updated 4 years ago
- ☆175Updated 6 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆194Updated 3 years ago
- For Linux binary Exploitation☆832Updated 7 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆622Updated last month
- The vm images in this repo are lost, we recommend our new project: https://github.com/hust-open-atom-club/S2VulnHub☆331Updated last year