japsingh / DVWALinks
Damned Vulnerable Windows Application
☆14Updated 6 years ago
Alternatives and similar repositories for DVWA
Users that are interested in DVWA are comparing it to the libraries listed below
Sorting:
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- ☆18Updated 5 years ago
- ☆28Updated 4 years ago
- ☆48Updated 5 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- ☆91Updated 5 years ago
- ☆30Updated 5 months ago
- Google Chrome Use After Free☆61Updated 3 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated 2 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- ☆80Updated 11 months ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆19Updated 6 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆24Updated 6 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- ☆24Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Super IOCTL Basic Fuzzer☆15Updated 6 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Updated 5 years ago
- ☆21Updated 5 years ago
- ☆64Updated last year
- android-inject-hook☆15Updated 8 years ago