n132 / RetroverFlowLinks
☆21Updated 5 months ago
Alternatives and similar repositories for RetroverFlow
Users that are interested in RetroverFlow are comparing it to the libraries listed below
Sorting:
- My browser pwn collections. Mainly JavaScript engine stuff.☆32Updated 7 months ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Updated 2 months ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Updated last year
- For V8CTF M122☆14Updated last year
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Updated 2 years ago
- Linux kernel privilege escalation techniques☆142Updated last year
- ☆40Updated last month
- ☆66Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆96Updated 3 years ago
- ☆25Updated last year
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- ☆41Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆91Updated last week
- linux kernel cross page attack demo module☆30Updated 2 years ago
- a new class of file structure attacks☆54Updated 2 years ago
- ☆12Updated last year
- A gdb plugin for linux kernel.☆28Updated 2 years ago
- A Linux Kernel Exploitation C Library☆16Updated 2 months ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆76Updated 3 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆14Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Updated 4 years ago
- attachments and (some) writeups/source code for RWCTF 5th☆57Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆18Updated last year
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆78Updated last year
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 2 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆229Updated 8 months ago
- ☆41Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆63Updated last year
- A tool combining DWARF info and source to search for kernel heap objects☆24Updated last year
- A V8 Sandbox Escape Technique.☆28Updated last year