sathwikch / windows-exploitation
☆47Updated 6 years ago
Alternatives and similar repositories for windows-exploitation:
Users that are interested in windows-exploitation are comparing it to the libraries listed below
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated last month
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆37Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆73Updated 7 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Windows KASLR bypass using prefetch side-channel☆78Updated 10 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Updated last year
- Some of my windows kernel exploits for learning purposes☆122Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 2 weeks ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆44Updated 4 years ago
- Leveraging patch diffing to discover new vulnerabilities☆112Updated 5 months ago
- ☆145Updated last year
- ☆67Updated 2 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆83Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated 2 weeks ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- Writeups for CTF challenges☆30Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆126Updated last year
- Analysis of the vulnerability☆50Updated last year
- ☆24Updated last year
- Proof-of-Concept for CVE-2024-26218☆50Updated 10 months ago
- Random CVEs☆30Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆96Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 11 months ago
- Slides about HyperDbg☆30Updated 9 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆115Updated 4 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 3 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆90Updated 5 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆114Updated 10 months ago