leesh3288 / WinPwnLinks
Windows Pwnable Study
☆370Updated last month
Alternatives and similar repositories for WinPwn
Users that are interested in WinPwn are comparing it to the libraries listed below
Sorting:
- Kernel development & exploitation practice environment.☆233Updated last year
- kernel-pwn and writeup collection☆640Updated last year
- repository for kernel exploit practice☆406Updated 5 years ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆516Updated this week
- various docs (that are interesting, or not, depending on the point of view...)☆119Updated last year
- Collection of browser challenges☆137Updated 4 years ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆339Updated 4 months ago
- ☆165Updated 3 years ago
- ☆194Updated 7 years ago
- Write-ups for various CTF☆192Updated last year
- An updated collection of resources targeting browser-exploitation.☆818Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆830Updated 5 years ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆517Updated last month
- Basic pwntools for Windows☆267Updated 2 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆231Updated 2 years ago
- PAWNYABLE!☆211Updated last year
- helps visualize heap operations for pwn and debugging☆319Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆66Updated 4 years ago
- angr tutorial for ctf☆154Updated 4 years ago
- Winnie makes fuzzing Windows applications easy☆562Updated 2 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆422Updated 3 months ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆444Updated last year
- This Repository aims at giving a basic idea about Kernel Exploitation.☆518Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆226Updated 7 months ago
- Source code for the 2022 DEF CON Qualifiers.☆265Updated last year
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆189Updated last year
- CTFs and solutions for Linux binary exploitation.☆110Updated last year
- ☆45Updated last year
- share some useful archives about vm and qemu escape exploit.☆553Updated last year
- FSOP Again☆24Updated 3 years ago