exp-sky / Awesome-Advanced-Windows-Exploitation-ReferencesView external linksLinks
List of Awesome Advanced Windows Exploitation References
☆34Dec 14, 2020Updated 5 years ago
Alternatives and similar repositories for Awesome-Advanced-Windows-Exploitation-References
Users that are interested in Awesome-Advanced-Windows-Exploitation-References are comparing it to the libraries listed below
Sorting:
- iot安全题目学习记录☆16Dec 13, 2021Updated 4 years ago
- a simple method to get v8 source code with github action☆77Sep 7, 2023Updated 2 years ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- Static Cross-Entry UAF Detector☆22Apr 28, 2025Updated 9 months ago
- LibAFL 文档书 简体中文版☆17Mar 16, 2022Updated 3 years ago
- A gdb for fuzzing☆22Nov 26, 2021Updated 4 years ago
- List of Awesome Advanced Windows Exploitation References☆1,546Jan 13, 2022Updated 4 years ago
- ☆57May 10, 2024Updated last year
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- ☆17May 30, 2020Updated 5 years ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago
- ☆11Nov 10, 2023Updated 2 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- slides for conference talks☆105Jul 27, 2025Updated 6 months ago
- ☆28Jul 31, 2022Updated 3 years ago
- R toolbox to explore the TRON blockchain☆10Jul 18, 2021Updated 4 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Jan 24, 2021Updated 5 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆256Oct 29, 2023Updated 2 years ago
- ☆47May 27, 2023Updated 2 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Python implementation of various (graph) algorithms☆11Nov 22, 2013Updated 12 years ago
- 🔑 WinPass11 WinService is a tool for loading keys into the registry on startup with the use of Windows Services.☆13Jun 29, 2021Updated 4 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆11Jul 4, 2018Updated 7 years ago
- Innora-Defender: 先进的勒索软件分析与恢复框架☆16May 6, 2025Updated 9 months ago
- crazy thing☆18Nov 27, 2011Updated 14 years ago
- 《智能投顾》读书笔记☆12May 23, 2019Updated 6 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- docker运行cs4.7server端☆39Dec 3, 2022Updated 3 years ago
- ☆20Jan 30, 2026Updated 2 weeks ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- ☆12Jan 28, 2026Updated 2 weeks ago
- ☆10Sep 10, 2022Updated 3 years ago
- ☠️ Code for the Hackfest Workshop☆10Oct 12, 2024Updated last year
- Terraform Provider for Confluence☆10May 16, 2022Updated 3 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Source code for MA4270: Data Modelling and Computation on Transformers and Nadaraya-Watson Kernel Regression☆18May 29, 2024Updated last year
- ☆12Apr 22, 2023Updated 2 years ago