eLoopWoo / zenysec-exploit-exercisesLinks
Exploit Exercises for Security Researchers (arm, x86...)
☆13Updated 6 years ago
Alternatives and similar repositories for zenysec-exploit-exercises
Users that are interested in zenysec-exploit-exercises are comparing it to the libraries listed below
Sorting:
- kernel pool windbg extension☆84Updated 9 years ago
- ☆72Updated 3 years ago
- Collects extended function properties from IDA Pro databases☆93Updated 4 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 11 months ago
- Modify data structures in the Windows kernel, hiding processes by PID☆15Updated 7 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 6 years ago
- Static unpacker for FinSpy VM☆101Updated 3 years ago
- ☆50Updated 8 years ago
- Windows SMEP Bypass U=S☆37Updated 9 years ago
- This IDAPython script tags subroutines according to their use of imported functions☆73Updated 4 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 4 months ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- IDA plugin to explore and browse tags☆56Updated 5 years ago
- ☆86Updated 8 months ago
- ☆62Updated 8 years ago
- exploit development☆49Updated 7 years ago
- dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>☆66Updated 8 years ago
- Simple library to spray the Windows Kernel Pool☆109Updated 5 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Analyses in IDA/Hex-Rays☆83Updated 2 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub☆79Updated 12 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆40Updated 10 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- PoC for a taint based attack on VMProtect☆108Updated 5 years ago
- IDA plugin CMake build-script☆34Updated 7 months ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 7 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆110Updated last year