ALSchwalm / foresightLinks
A tool for predicting the output of random number generators
☆193Updated 8 years ago
Alternatives and similar repositories for foresight
Users that are interested in foresight are comparing it to the libraries listed below
Sorting:
- Teach you a binary exploitation for great good.☆293Updated 7 years ago
- Documentation for the Mechanical Phish.☆235Updated 9 years ago
- An evolutionary knowledge-based fuzzer☆271Updated last year
- GATEKEEPER: Inline and on-target defense☆121Updated 3 years ago
- 2016 DEF CON Qualifier Challenges☆178Updated 9 years ago
- ☆280Updated 5 years ago
- CTF Writeups☆190Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆289Updated 9 years ago
- Files from my DEFCON CTF VM.☆273Updated 9 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated this week
- A distributed fuzzing testing suite with web administration☆374Updated 6 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆176Updated 5 years ago
- Repository to train/learn memory corruption on the ARM platform.☆357Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆163Updated 8 years ago
- Hodor! Fuzzer..☆129Updated 9 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Updated 7 years ago
- ☆159Updated 10 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- The Internetwache CTF 2016 repository☆74Updated 4 years ago
- Deprecated Binary Ninja prototype written in Python☆523Updated 5 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Updated 9 years ago
- ☆77Updated 10 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- Seed recovery tool for PRNGs☆386Updated 7 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 10 years ago
- random brain dumps☆350Updated 8 years ago
- capstone based disassembler for extracting to binnavi☆230Updated 9 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 6 years ago
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- Simplify format string exploitation.☆345Updated 4 years ago