japsingh / DVWALinks
Damned Vulnerable Windows Application
☆14Updated 5 years ago
Alternatives and similar repositories for DVWA
Users that are interested in DVWA are comparing it to the libraries listed below
Sorting:
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- ☆24Updated 3 years ago
- ☆28Updated 7 months ago
- Slides from various conference talks☆37Updated 2 years ago
- ☆48Updated 4 years ago
- ☆26Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- ☆18Updated 5 years ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- ☆21Updated 4 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆34Updated 3 years ago
- ☆10Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆98Updated 4 years ago
- ☆12Updated 3 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 3 years ago
- Vulnerabilities, exploits, and PoCs☆36Updated this week
- ☆23Updated 4 months ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆22Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- ☆14Updated 3 years ago