☆153Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for 35C3_Modern_Windows_Userspace_Exploitation
Users that are interested in 35C3_Modern_Windows_Userspace_Exploitation are comparing it to the libraries listed below
Sorting:
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆147Jan 23, 2021Updated 5 years ago
- ☆86Oct 29, 2023Updated 2 years ago
- ☆286Apr 23, 2020Updated 5 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- Windows Pwnable Study☆407Jun 16, 2025Updated 8 months ago
- List of Awesome Advanced Windows Exploitation References☆1,548Jan 13, 2022Updated 4 years ago
- Have fun with the LowFragmentationHeap☆254Feb 3, 2021Updated 5 years ago
- Source code for the DEF CON 30 CTF Qualifiers.☆267May 27, 2024Updated last year
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- An updated collection of resources targeting browser-exploitation.☆828Mar 8, 2021Updated 4 years ago
- Write-ups from A*0*E.☆199May 12, 2020Updated 5 years ago
- ☆176May 2, 2019Updated 6 years ago
- ☆16Jun 9, 2023Updated 2 years ago
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆443Apr 11, 2025Updated 10 months ago
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆162Apr 13, 2019Updated 6 years ago
- Let's get familiar with Windows pwn 😎☆61Feb 24, 2020Updated 6 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Mar 3, 2021Updated 5 years ago
- ☆228Dec 9, 2020Updated 5 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆162Oct 28, 2019Updated 6 years ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- Basic pwntools for Windows☆267Apr 22, 2023Updated 2 years ago
- ☆43Dec 2, 2021Updated 4 years ago
- share some useful archives about vm and qemu escape exploit.☆583Apr 12, 2024Updated last year
- AST interpreter with clang 5.0.0 and llvm 5.0.0☆14Dec 7, 2019Updated 6 years ago
- ☆27Feb 13, 2026Updated 2 weeks ago