☆21Apr 6, 2025Updated 10 months ago
Alternatives and similar repositories for RetroverFlow
Users that are interested in RetroverFlow are comparing it to the libraries listed below
Sorting:
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆71Apr 25, 2025Updated 10 months ago
- My public CTF challenge☆17Aug 25, 2025Updated 6 months ago
- iot安全题目学习记录☆16Dec 13, 2021Updated 4 years ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆47Feb 12, 2026Updated 2 weeks ago
- Windows Win32 Kernel Subsystem☆36Aug 23, 2025Updated 6 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- NVRAM emulator☆100May 21, 2024Updated last year
- a new class of file structure attacks☆59Nov 19, 2022Updated 3 years ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Mar 6, 2023Updated 2 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- ☆28Jun 14, 2022Updated 3 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆40Apr 23, 2025Updated 10 months ago
- Source code for the DEF CON 33 CTF Finals.☆25Aug 26, 2025Updated 6 months ago
- ☆55Apr 28, 2022Updated 3 years ago
- Kernel Information Disclosure☆32Jan 13, 2026Updated last month
- ☆23Jan 27, 2026Updated last month
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Apr 11, 2023Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆33Updated this week
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆143Nov 3, 2025Updated 3 months ago
- ☆19May 1, 2025Updated 10 months ago
- xiaomi lua anti☆33Jul 8, 2020Updated 5 years ago
- The container escape challenge of Be A RWCTFer competition (https://be-a-rwctfer.realworldctf.com/)☆61Mar 20, 2025Updated 11 months ago
- ☆19Jul 21, 2025Updated 7 months ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- VM Escape for Parallels Desktop <18.1.1☆172Mar 15, 2024Updated last year
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 5 months ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- The PoC for CVE-2025-70795 / CVE-2026-0828 and its update☆37Feb 16, 2026Updated 2 weeks ago