eLoopWoo / zenysec-exploit-exercisesLinks
Exploit Exercises for Security Researchers (arm, x86...)
☆13Updated 6 years ago
Alternatives and similar repositories for zenysec-exploit-exercises
Users that are interested in zenysec-exploit-exercises are comparing it to the libraries listed below
Sorting:
- kernel pool windbg extension☆83Updated 10 years ago
- ☆72Updated 4 years ago
- Simple library to spray the Windows Kernel Pool☆110Updated 6 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated last year
- Collects extended function properties from IDA Pro databases☆94Updated 5 years ago
- Toolkit for Hyper-V security research☆157Updated 3 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated last year
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆69Updated 7 years ago
- IDA Pro plugin to show functions in a tree view☆115Updated 4 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆136Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆127Updated last year
- This IDAPython script tags subroutines according to their use of imported functions☆74Updated 4 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆73Updated 6 years ago
- windbg plugin for win32k debugging☆75Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆206Updated last year
- ☆89Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Updated 7 years ago
- ☆63Updated 8 years ago
- A collection of my IDA plugins☆135Updated 5 years ago
- VSCode dark theme for IDA 7.3☆28Updated 5 years ago
- This is a place to share my miscellaneous projects.☆116Updated 5 years ago
- IDA plugin to explore and browse tags☆55Updated 6 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- A fast execution trace symbolizer for Windows.☆130Updated last year
- idamagnum is a plugin for integrating MagnumDB requests within IDA☆134Updated 5 years ago
- ☆91Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated 2 years ago