xairy / vmware-exploitation
A collection of links related to VMware escape exploits
☆1,418Updated 8 months ago
Alternatives and similar repositories for vmware-exploitation:
Users that are interested in vmware-exploitation are comparing it to the libraries listed below
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆819Updated 4 years ago
- List of Awesome Advanced Windows Exploitation References☆1,486Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,634Updated 2 months ago
- Various kernel exploits☆774Updated last year
- share some useful archives about vm and qemu escape exploit.☆548Updated last year
- Checksec, but for Windows: static detection of security mitigations in executables☆587Updated 3 months ago
- An updated collection of resources targeting browser-exploitation.☆817Updated 4 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 3 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,958Updated 2 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,127Updated last year
- A set of Linux binary exploitation tasks for beginners on various architectures☆532Updated 3 years ago
- My proof-of-concept exploits for the Linux kernel☆1,470Updated 3 years ago
- Proofs-of-concept☆791Updated 8 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,133Updated last year
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,930Updated last week
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,197Updated last month
- Repository for information about 0-days exploited in-the-wild.☆790Updated 2 weeks ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,572Updated 3 weeks ago
- Android Kernel Exploitation☆609Updated 3 years ago
- collect for learning cases☆583Updated 10 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,220Updated 8 months ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆899Updated 11 months ago
- awesome list of browser exploitation tutorials☆2,142Updated last year
- ☆787Updated 2 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆720Updated 6 months ago
- AV/EDR evasion via direct system calls.☆1,867Updated 2 years ago
- Script for searching the extracted firmware file system for goodies!☆1,117Updated last year
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆702Updated 4 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,117Updated 4 years ago
- A fork of AFL for fuzzing Windows binaries☆2,424Updated last month