pwncollege / windows-dojoView external linksLinks
☆12Apr 28, 2025Updated 9 months ago
Alternatives and similar repositories for windows-dojo
Users that are interested in windows-dojo are comparing it to the libraries listed below
Sorting:
- Extended library for using direct system calls on windows☆17Feb 6, 2022Updated 4 years ago
- ☆16Apr 6, 2023Updated 2 years ago
- A dojo to teach the basics of low-level computing.☆19Jan 28, 2026Updated 2 weeks ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆15Nov 11, 2022Updated 3 years ago
- Pysh: the python shell☆20Nov 15, 2016Updated 9 years ago
- Accelerated execution for fast Windows fuzzing☆25Jan 9, 2025Updated last year
- rust ctf writeups(Rust CTF解题报告)☆51Jan 4, 2022Updated 4 years ago
- ☆26Updated this week
- Alternative API for IDA / Hex-Rays☆75Sep 18, 2023Updated 2 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Jul 20, 2021Updated 4 years ago
- Developed with ♥ by Hackerdom team☆23Apr 26, 2023Updated 2 years ago
- My collection of PoCs☆26Nov 9, 2023Updated 2 years ago
- Exploiting the KsecDD Windows driver through Server Silos☆76Nov 11, 2024Updated last year
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- Deobfuscate OLLVM Bogus Control Flow via angr☆68Nov 26, 2021Updated 4 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- HTTP Desync Attack☆28May 17, 2020Updated 5 years ago
- Target components for kAFL/Nyx Fuzzer☆35Jan 4, 2024Updated 2 years ago
- A Summoners War all purpose bot!☆11Sep 21, 2018Updated 7 years ago
- ☆270Aug 2, 2025Updated 6 months ago
- An open-source interactive visualization tool for comparing IR CFGs☆91Jul 13, 2025Updated 7 months ago
- Pure Python Itanium C++ ABI demangler☆39Aug 20, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- A suite of cybersecurity applications used in Brazilian Army Cyber Security course to accelerate and automate processes. Some tools have …☆21Feb 23, 2025Updated 11 months ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆14Mar 12, 2025Updated 11 months ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- LLVM Kaleidoscope Tutorial in Rust☆45May 10, 2025Updated 9 months ago
- implements php-style serialize/unserialize for python 3.7+☆38Sep 19, 2022Updated 3 years ago
- ☆12Jan 28, 2026Updated 2 weeks ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Well-documented Go functions for building HTMX attributes.☆11May 27, 2024Updated last year
- ☆10Oct 24, 2022Updated 3 years ago
- bert蒸馏实践,包含BiLSTM蒸馏BERT和TinyBert☆13Apr 23, 2022Updated 3 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆48Sep 15, 2023Updated 2 years ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- Golang / SegDSP Spectrum Paint Generator☆10Feb 20, 2019Updated 6 years ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆33Sep 22, 2025Updated 4 months ago