☆318Apr 8, 2022Updated 3 years ago
Alternatives and similar repositories for Exploit-Development
Users that are interested in Exploit-Development are comparing it to the libraries listed below
Sorting:
- Kernel Exploits☆260Jul 18, 2021Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- List of Awesome Advanced Windows Exploitation References☆1,548Jan 13, 2022Updated 4 years ago
- Resources for Windows exploit development☆1,649Dec 20, 2021Updated 4 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆143Oct 3, 2021Updated 4 years ago
- OSEE Preparation☆192Feb 15, 2019Updated 7 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Aug 4, 2021Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆236Jun 22, 2023Updated 2 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆442Apr 11, 2025Updated 10 months ago
- Dump of win32k POCs for bugs I've found☆381Mar 6, 2022Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,491Sep 4, 2024Updated last year
- CVE-2020-15368, aka "How to exploit a vulnerable driver"☆506Apr 14, 2022Updated 3 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆633Jul 7, 2017Updated 8 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆599Jul 15, 2024Updated last year
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆225May 15, 2020Updated 5 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆744Nov 1, 2024Updated last year
- ☆19Jan 31, 2023Updated 3 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- Small and convenient C2 tool for Windows targets☆612Mar 8, 2022Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Jul 27, 2022Updated 3 years ago
- collect for learning cases☆593Jun 16, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,167Sep 29, 2021Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- ☆431Nov 28, 2020Updated 5 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Jun 8, 2020Updated 5 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- ☆197Feb 14, 2024Updated 2 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- ☆50Mar 21, 2019Updated 6 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Feb 19, 2026Updated last week
- The program is designed to obfuscate the shellcode.☆203Jul 13, 2021Updated 4 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Collection of Offensive C# Tooling☆1,469Feb 6, 2023Updated 3 years ago
- Extract Windows Defender database from vdm files and unpack it☆475Updated this week