WinMin / awesome-vm-exploit
share some useful archives about vm and qemu escape exploit.
☆514Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-vm-exploit
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆800Updated 4 years ago
- Some pwn challenges selected for training and education.☆379Updated last year
- An updated collection of resources targeting browser-exploitation.☆809Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,362Updated 2 months ago
- Windows Pwnable Study☆322Updated 4 years ago
- 💖CTF pwn framework.☆341Updated 2 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆639Updated last week
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- windows debug and exploit toolset for both user and kernel mode☆176Updated 2 months ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆389Updated 4 years ago
- ☆222Updated 3 years ago
- kernel-pwn and writeup collection☆568Updated last year
- Winnie is an end-to-end system that makes fuzzing Windows applications easy☆542Updated last year
- 🔍Heap analysis tool for CTF pwn.☆221Updated 3 years ago
- repository for kernel exploit practice☆388Updated 5 years ago
- Basic pwntools for Windows☆257Updated last year
- Kernel development & exploitation practice environment.☆212Updated last year
- This Repository aims at giving a basic idea about Kernel Exploitation.☆501Updated 4 months ago
- For Linux binary Exploitation☆818Updated 6 years ago
- ☆280Updated 4 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆519Updated 2 years ago
- Linux Heap Exploitation Practice☆377Updated 5 years ago
- Various kernel exploits☆746Updated 8 months ago
- Script to setup pwn environment for CTF with Docker☆148Updated 3 years ago
- ☆171Updated 5 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆380Updated last year
- Web wrapper of niklasb/libc-database☆196Updated 3 years ago
- ☆372Updated 10 months ago
- ☆176Updated 6 years ago