Offensive security research lab focused on exploit engineering, vulnerability research, and OS internals. We publish exploitation techniques, CVE proof-of-concepts, and in-depth analysis of Windows and Linux attack surfaces from userland primitives to kernel exploitation.
- Exploit Engineering: Kernel and userland exploitation, privilege escalation primitives, modern mitigation bypass on Windows and Linux.
- Vulnerability Research: CVE analysis, patch diffing, root cause analysis, and weaponized proof-of-concepts across Windows, Linux, and enterprise software.
- OS Internals: Deep inspection of Windows and Linux memory management, heap internals, driver attack surfaces, and kernel subsystems.
| Repository | Description |
|---|---|
| diffrays | Binary patch diffing tool for vulnerability research and exploit development. Supports IDA Domain API with automated diff pipelines. |
| exploitation-grimoire | Full-spectrum exploit development reference covering Linux and Windows including kernel exploitation, heap exploitation, ROP, and modern bypass techniques. |
| windows-heap-exploitation | Deep dive into Windows heap internals, Segment Heap, LFH, VS backend, and exploitation techniques on modern Windows. |
| cve-pocs | Documented proof-of-concepts for CVEs across Windows, Linux, and enterprise software with root cause analysis and exploitation notes. |
| byovd-watchdog | Identifies LOLDrivers not blocked by the active HVCI policy built for BYOVD attack surface analysis. |
Ayushman Dubey (D4mianWayne) — Founder & Lead Researcher
Nikhil John Thomas (ghostbyt3) — Co-Founder & Security Researcher
- Labs: labs.pwnfuzz.com
- Website: pwnfuzz.com
- X: @pwnfuzz
- Contact: research@pwnfuzz.com