sathwikch / windows-exploitationLinks
☆53Updated 6 years ago
Alternatives and similar repositories for windows-exploitation
Users that are interested in windows-exploitation are comparing it to the libraries listed below
Sorting:
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- Some of my windows kernel exploits for learning purposes☆131Updated 3 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆80Updated 8 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆158Updated last month
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- ☆74Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆86Updated last week
- Aplos an extremely simple fuzzer for Windows binaries.☆67Updated 8 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆51Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 3 weeks ago
- ☆147Updated last year
- ☆83Updated 2 months ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆108Updated last year
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆227Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆246Updated 3 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆105Updated 3 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- Slides about HyperDbg☆39Updated 3 months ago
- Binary Exploitation Phrack CTF Challenge☆134Updated 2 months ago
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆69Updated last year
- Binary Exploitation Phrack CTF Challenge☆65Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆131Updated last year