List of Awesome Advanced Windows Exploitation References
☆34Dec 14, 2020Updated 5 years ago
Alternatives and similar repositories for Awesome-Advanced-Windows-Exploitation-References
Users that are interested in Awesome-Advanced-Windows-Exploitation-References are comparing it to the libraries listed below
Sorting:
- iot安全题目学习记录☆16Dec 13, 2021Updated 4 years ago
- a simple method to get v8 source code with github action☆77Sep 7, 2023Updated 2 years ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- Static Cross-Entry UAF Detector☆23Apr 28, 2025Updated 10 months ago
- LibAFL 文档书 简体中文版☆17Mar 16, 2022Updated 3 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- A gdb for fuzzing☆22Nov 26, 2021Updated 4 years ago
- List of Awesome Advanced Windows Exploitation References☆1,547Jan 13, 2022Updated 4 years ago
- ☆58May 10, 2024Updated last year
- ☆17May 30, 2020Updated 5 years ago
- ☆12Nov 10, 2023Updated 2 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago
- ☆28Jul 31, 2022Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Jan 24, 2021Updated 5 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- Collection of browser challenges☆140May 3, 2021Updated 4 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆257Oct 29, 2023Updated 2 years ago
- ☆47May 27, 2023Updated 2 years ago
- Python implementation of various (graph) algorithms☆11Nov 22, 2013Updated 12 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- docker运行cs4.7server端☆39Dec 3, 2022Updated 3 years ago
- Simple macro language extentions to systemtap☆12Dec 14, 2022Updated 3 years ago
- Mac Address Flooding Script☆11Dec 9, 2015Updated 10 years ago
- A VPN written in Rust☆13Apr 17, 2025Updated 10 months ago
- ☆10Oct 11, 2020Updated 5 years ago
- ☆20Jan 30, 2026Updated last month
- Shellcode异或加密工具☆12Mar 23, 2017Updated 8 years ago
- ☆16Aug 19, 2024Updated last year
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- A Simple ShellcodeLoader☆11Jun 4, 2021Updated 4 years ago
- ☆16Feb 27, 2026Updated last week
- ☆17May 22, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago