Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.
☆921May 20, 2024Updated 2 years ago
Alternatives and similar repositories for exploit_mitigations
Users that are interested in exploit_mitigations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆189Feb 8, 2025Updated last year
- A collection of links related to VMware escape exploits☆1,490Sep 4, 2024Updated last year
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,754Jan 2, 2026Updated 4 months ago
- Corpus of public v8 vulnerability PoCs.☆224Jun 5, 2021Updated 4 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆261Sep 1, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆864Jun 4, 2020Updated 5 years ago
- Snapshot-based coverage-guided windows kernel fuzzer☆324Dec 16, 2021Updated 4 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,349Mar 2, 2026Updated 2 months ago
- repository for kernel exploit practice☆418Nov 12, 2019Updated 6 years ago
- A collection of links related to Linux kernel security and exploitation☆6,447Mar 7, 2026Updated 2 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆199Jul 27, 2022Updated 3 years ago
- kernel-pwn and writeup collection☆718Oct 2, 2023Updated 2 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,484Jul 12, 2024Updated last year
- Dump of win32k POCs for bugs I've found☆378Mar 6, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,287Jan 29, 2026Updated 3 months ago
- Resources for Windows exploit development☆1,654Dec 20, 2021Updated 4 years ago
- List of Awesome Advanced Windows Exploitation References☆1,562Jan 13, 2022Updated 4 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆211Jul 2, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆3,002Feb 24, 2025Updated last year
- Here is some resources about macOS/iOS system security.☆548Feb 19, 2025Updated last year
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,671Jun 17, 2024Updated last year
- Internals information about Hyper-V☆739May 6, 2026Updated 2 weeks ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,145Sep 14, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- awesome list of browser exploitation tutorials☆2,278Sep 18, 2023Updated 2 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆766Jan 27, 2026Updated 3 months ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,358Feb 21, 2025Updated last year
- KASLD maps the Linux kernel virtual and physical memory layout as an unprivileged local user to defeat Kernel Address Space Layout Random…☆489May 11, 2026Updated last week
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆564Dec 11, 2023Updated 2 years ago
- A lightweight dynamic instrumentation library☆1,340Mar 13, 2026Updated 2 months ago
- A Trace Explorer for Reverse Engineers☆1,538Oct 23, 2023Updated 2 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆747Nov 1, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- My Chrome and Safari exploit code + write-up repo☆533Nov 5, 2021Updated 4 years ago
- A Coverage Explorer for Reverse Engineers☆2,543Feb 14, 2026Updated 3 months ago
- ☆227Dec 9, 2020Updated 5 years ago
- Windows Pwnable Study☆418Jun 16, 2025Updated 11 months ago
- ☆298Jun 21, 2022Updated 3 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆639Jul 7, 2017Updated 8 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,490Updated this week