☆153Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for 35C3_Modern_Windows_Userspace_Exploitation
Users that are interested in 35C3_Modern_Windows_Userspace_Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- Have fun with the LowFragmentationHeap☆254Feb 3, 2021Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆147Jan 23, 2021Updated 5 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- ☆86Oct 29, 2023Updated 2 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- ☆287Apr 23, 2020Updated 5 years ago
- ☆16Jun 9, 2023Updated 2 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- Write-ups from A*0*E.☆199May 12, 2020Updated 5 years ago
- Source code for the DEF CON 30 CTF Qualifiers.☆266May 27, 2024Updated last year
- Windows Pwnable Study☆412Jun 16, 2025Updated 9 months ago
- List of Awesome Advanced Windows Exploitation References☆1,552Jan 13, 2022Updated 4 years ago
- 搜集的一些kernel paper☆26Feb 19, 2020Updated 6 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆445Apr 11, 2025Updated 11 months ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- ☆176May 2, 2019Updated 6 years ago
- An updated collection of resources targeting browser-exploitation.☆829Mar 8, 2021Updated 5 years ago
- ☆151Jan 7, 2020Updated 6 years ago
- ☆43Dec 2, 2021Updated 4 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago
- Let's get familiar with Windows pwn 😎☆61Feb 24, 2020Updated 6 years ago
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆162Apr 13, 2019Updated 6 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆260Sep 1, 2022Updated 3 years ago
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆162Oct 28, 2019Updated 6 years ago
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago