☆21Apr 6, 2025Updated 11 months ago
Alternatives and similar repositories for RetroverFlow
Users that are interested in RetroverFlow are comparing it to the libraries listed below
Sorting:
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- iot安全题目学习记录☆17Dec 13, 2021Updated 4 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- My public CTF challenge☆17Aug 25, 2025Updated 6 months ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- Windows Win32 Kernel Subsystem☆37Aug 23, 2025Updated 6 months ago
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆71Apr 25, 2025Updated 10 months ago
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆48Jan 22, 2026Updated 2 months ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Mar 6, 2023Updated 3 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- ☆55Apr 28, 2022Updated 3 years ago
- NVRAM emulator☆100May 21, 2024Updated last year
- Kernel Information Disclosure☆33Jan 13, 2026Updated 2 months ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆57Updated this week
- ☆30Nov 25, 2025Updated 3 months ago
- ☆40Apr 23, 2025Updated 10 months ago
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆143Nov 3, 2025Updated 4 months ago
- a new class of file structure attacks☆59Nov 19, 2022Updated 3 years ago
- VM Escape for Parallels Desktop <18.1.1☆172Mar 15, 2024Updated 2 years ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- ☆28Jun 14, 2022Updated 3 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- The open source coding agent. (Unleashed 、Removing LLM safety guardrails)☆200Updated this week
- The CTF challenges that I made☆18Mar 31, 2023Updated 2 years ago
- PoC & Exploit for CVE-2025-32023 / PlaidCTF 2025 "Zerodeo"☆210Jul 6, 2025Updated 8 months ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Apr 11, 2023Updated 2 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- Automatic use of House of Some & House of Illusion.☆85Sep 9, 2025Updated 6 months ago
- ReCopilot IDA☆52Jan 12, 2026Updated 2 months ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 2 months ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆19May 1, 2025Updated 10 months ago
- ☆23Jan 27, 2026Updated last month