paulveillard / cybersecurity-windows-exploitationLinks
A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Windows Exploitation.
☆46Updated last year
Alternatives and similar repositories for cybersecurity-windows-exploitation
Users that are interested in cybersecurity-windows-exploitation are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Windows Exploitation resources, and shiny things.☆80Updated 8 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆47Updated 5 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 7 months ago
- ☆53Updated 6 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆109Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆134Updated 11 months ago
- A comprehensive Hypervisor resources repo☆168Updated 2 weeks ago
- ☆38Updated 10 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆105Updated 3 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆46Updated 4 years ago
- Some of my windows kernel exploits for learning purposes☆130Updated 3 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆57Updated last month
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- Programming course for Wannabes☆55Updated 8 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- ☆59Updated last year
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Updated 2 months ago
- A Repository to Track Anti-Forensic Techniques☆112Updated 2 years ago
- Recon 2023 slides and code☆79Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆51Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- ☆105Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆98Updated 4 months ago