List of Awesome Advanced Windows Exploitation References
☆1,562Jan 13, 2022Updated 4 years ago
Alternatives and similar repositories for Awesome-Advanced-Windows-Exploitation-References
Users that are interested in Awesome-Advanced-Windows-Exploitation-References are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of links related to VMware escape exploits☆1,491Sep 4, 2024Updated last year
- Resources for Windows exploit development☆1,654Dec 20, 2021Updated 4 years ago
- awesome list of browser exploitation tutorials☆2,278Sep 18, 2023Updated 2 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆3,003Feb 24, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,808Apr 3, 2024Updated 2 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,110May 27, 2022Updated 3 years ago
- A collection of links related to Linux kernel security and exploitation☆6,435Mar 7, 2026Updated 2 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆865Jun 4, 2020Updated 5 years ago
- collect for learning cases☆593Apr 12, 2026Updated 3 weeks ago
- My Chrome and Safari exploit code + write-up repo☆533Nov 5, 2021Updated 4 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆748Nov 1, 2024Updated last year
- windows kernel security development☆2,064Sep 6, 2022Updated 3 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆641Jul 7, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,322Dec 7, 2020Updated 5 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.