leesh3288 / WinPwnLinks
Windows Pwnable Study
☆358Updated last week
Alternatives and similar repositories for WinPwn
Users that are interested in WinPwn are comparing it to the libraries listed below
Sorting:
- kernel-pwn and writeup collection☆625Updated last year
- ☆164Updated 2 years ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆491Updated this week
- repository for kernel exploit practice☆398Updated 5 years ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆509Updated 2 weeks ago
- Basic pwntools for Windows☆263Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆117Updated last year
- An updated collection of resources targeting browser-exploitation.☆819Updated 4 years ago
- Kernel development & exploitation practice environment.☆232Updated last year
- Collection of browser challenges☆137Updated 4 years ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆325Updated 2 months ago
- Use angr in Ghidra☆585Updated 10 months ago
- ☆192Updated 7 years ago
- PAWNYABLE!☆208Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆226Updated 6 months ago
- Some pwn challenges selected for training and education.☆384Updated last year
- CTF Reversing Challenges List☆276Updated 5 years ago
- angr tutorial for ctf☆152Updated 4 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆512Updated 11 months ago
- Write-ups for various CTF☆191Updated last year
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆441Updated 3 weeks ago
- helps visualize heap operations for pwn and debugging☆319Updated 2 years ago
- share some useful archives about vm and qemu escape exploit.☆550Updated last year
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆821Updated 5 years ago
- Source code for the 2022 DEF CON Qualifiers.☆265Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆228Updated 2 years ago
- Winnie makes fuzzing Windows applications easy☆559Updated 2 years ago
- ☆224Updated 4 years ago
- A collection of pwn/CTF related utilities for Ghidra☆681Updated 9 months ago
- ☆221Updated 2 weeks ago