WinMin / awesome-vm-exploit
share some useful archives about vm and qemu escape exploit.
☆538Updated 10 months ago
Alternatives and similar repositories for awesome-vm-exploit:
Users that are interested in awesome-vm-exploit are comparing it to the libraries listed below
- Some pwn challenges selected for training and education.☆380Updated last year
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆666Updated last month
- An updated collection of resources targeting browser-exploitation.☆813Updated 3 years ago
- Windows Pwnable Study☆331Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆812Updated 4 years ago
- 💖CTF pwn framework.☆343Updated 2 years ago
- A collection of links related to VMware escape exploits☆1,396Updated 5 months ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆396Updated 4 years ago
- windows debug and exploit toolset for both user and kernel mode☆177Updated 5 months ago
- kernel-pwn and writeup collection☆589Updated last year
- ☆222Updated 4 years ago
- Winnie makes fuzzing Windows applications easy☆548Updated 2 years ago
- For Linux binary Exploitation☆825Updated 6 years ago
- repository for kernel exploit practice☆392Updated 5 years ago
- A docker environment for pwn in ctf☆753Updated last year
- Basic pwntools for Windows☆259Updated last year
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆385Updated 2 years ago
- 🔍Heap analysis tool for CTF pwn.☆221Updated 3 years ago
- My Chrome and Safari exploit code + write-up repo☆527Updated 3 years ago
- To store some CTF_pwn_bins and exploits for self-practice☆424Updated 4 years ago
- Script to setup pwn environment for CTF with Docker☆151Updated 3 years ago
- Something about AEG☆264Updated 5 years ago
- How to build an efficient pwn development environment in 2020☆259Updated 4 years ago
- Collection of scripts and writeups☆320Updated 3 years ago
- Linux Heap Exploitation Practice☆377Updated 6 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆504Updated 7 months ago
- Web wrapper of niklasb/libc-database☆198Updated 2 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,125Updated last year
- Various kernel exploits☆766Updated 11 months ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆445Updated 11 months ago