paulveillard / cybersecurity-windows-exploitationLinks
A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Windows Exploitation.
☆50Updated last year
Alternatives and similar repositories for cybersecurity-windows-exploitation
Users that are interested in cybersecurity-windows-exploitation are comparing it to the libraries listed below
Sorting:
- ☆54Updated 6 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆22Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆47Updated 5 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆67Updated 9 months ago
- ☆39Updated last year
- Programming course for Wannabes☆56Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆112Updated 2 years ago
- A comprehensive Hypervisor resources repo☆183Updated last month
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- A curated list of awesome Windows Exploitation resources, and shiny things.☆84Updated 8 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆108Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆137Updated last year
- Recon 2023 slides and code☆80Updated 2 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆48Updated 4 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆63Updated 3 weeks ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Updated 4 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆52Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 4 months ago
- Malware Analysis tools☆26Updated last year
- Binary Exploitation Phrack CTF Challenge☆138Updated 3 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆75Updated 11 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆117Updated 6 months ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 3 months ago
- ☆69Updated 4 years ago