A tool for predicting the output of random number generators
☆193May 7, 2017Updated 8 years ago
Alternatives and similar repositories for foresight
Users that are interested in foresight are comparing it to the libraries listed below
Sorting:
- Seed recovery tool for PRNGs☆387Sep 17, 2018Updated 7 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- ☆236May 31, 2018Updated 7 years ago
- An IDA plugin to demangle Swift function names☆26Apr 23, 2016Updated 9 years ago
- Db Database Assessment Tool☆211Jun 26, 2018Updated 7 years ago
- Some helpful preload libraries for pwning stuff.☆1,649Mar 6, 2026Updated 2 weeks ago
- An Impractical Stack Language☆14Jun 12, 2020Updated 5 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- Go library and command line to seek for secrets on various sources.☆242Nov 14, 2019Updated 6 years ago
- Scripts for ElasticSearch vulns☆13Oct 17, 2015Updated 10 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆508May 11, 2021Updated 4 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- A tool for enumerating expired domains in CNAME records☆60Jun 30, 2016Updated 9 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 11 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- ☆90Mar 15, 2017Updated 9 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- peinjector - MITM PE file infector☆611May 11, 2016Updated 9 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325May 9, 2016Updated 9 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 12 years ago