WinMin / awesome-vm-exploitLinks
share some useful archives about vm and qemu escape exploit.
☆575Updated last year
Alternatives and similar repositories for awesome-vm-exploit
Users that are interested in awesome-vm-exploit are comparing it to the libraries listed below
Sorting:
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆744Updated 3 months ago
- Some pwn challenges selected for training and education.☆387Updated 2 years ago
- An updated collection of resources targeting browser-exploitation.☆820Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆847Updated 5 years ago
- 💖CTF pwn framework.☆343Updated 3 years ago
- windows debug and exploit toolset for both user and kernel mode☆191Updated 6 months ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆436Updated 8 months ago
- kernel-pwn and writeup collection☆682Updated 2 years ago
- ☆226Updated 5 years ago
- My Chrome and Safari exploit code + write-up repo☆531Updated 4 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆544Updated 3 years ago
- Windows Pwnable Study☆392Updated 6 months ago
- Kernel development & exploitation practice environment.☆243Updated 2 years ago
- Script to setup pwn environment for CTF with Docker☆154Updated 4 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Updated last year
- A collection of links related to VMware escape exploits☆1,479Updated last year
- ☆298Updated 3 years ago
- 🔍Heap analysis tool for CTF pwn.☆224Updated 4 years ago
- repository for kernel exploit practice☆410Updated 6 years ago
- ☆342Updated 3 years ago
- Winnie makes fuzzing Windows applications easy☆568Updated 3 years ago
- won't maintain☆133Updated 6 years ago
- CTF Reversing Challenges List☆289Updated 6 years ago
- Something about AEG☆270Updated 6 years ago
- helps visualize heap operations for pwn and debugging☆326Updated 2 years ago
- ☆175Updated 6 years ago
- For Linux binary Exploitation☆842Updated 7 years ago
- Basic pwntools for Windows☆268Updated 2 years ago
- Source code for the DEF CON 30 CTF Qualifiers.☆267Updated last year
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆555Updated 2 years ago