n132 / RetroverFlowLinks
☆21Updated 9 months ago
Alternatives and similar repositories for RetroverFlow
Users that are interested in RetroverFlow are comparing it to the libraries listed below
Sorting:
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Updated 7 months ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Updated last year
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Updated last year
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Updated 2 years ago
- A gdb plugin for linux kernel.☆28Updated 2 years ago
- Linux kernel privilege escalation techniques☆152Updated last year
- For V8CTF M122☆14Updated last year
- linux kernel cross page attack demo module☆31Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated 2 years ago
- ☆25Updated 2 years ago
- ☆40Updated 5 months ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆100Updated 3 years ago
- a new class of file structure attacks☆58Updated 3 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆101Updated 3 weeks ago
- Static Cross-Entry UAF Detector☆21Updated 9 months ago
- ☆66Updated 2 years ago
- ☆41Updated 2 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Updated 3 years ago
- A Linux Kernel Exploitation C Library☆19Updated 3 months ago
- ☆22Updated last week
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆188Updated 5 years ago
- ☆13Updated last year
- ☆12Updated 3 years ago
- attachments and (some) writeups/source code for RWCTF 5th☆59Updated 3 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 3 years ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆89Updated last year
- A V8 Sandbox Escape Technique.☆33Updated last year
- ☆92Updated 5 months ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆19Updated last year