ALSchwalm / foresightLinks
A tool for predicting the output of random number generators
☆193Updated 8 years ago
Alternatives and similar repositories for foresight
Users that are interested in foresight are comparing it to the libraries listed below
Sorting:
- Simplify format string exploitation.☆339Updated 3 years ago
- Teach you a binary exploitation for great good.☆294Updated 6 years ago
- CTF Writeups☆186Updated 7 years ago
- An evolutionary knowledge-based fuzzer☆271Updated last year
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Deprecated Binary Ninja prototype written in Python☆523Updated 4 years ago
- Repository to train/learn memory corruption on the ARM platform.☆354Updated 8 years ago
- ☆280Updated 5 years ago
- Tool to help with the exploitation of web application race conditions☆183Updated 6 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆179Updated 10 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last month
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- Documentation for the Mechanical Phish.☆234Updated 8 years ago
- Seed recovery tool for PRNGs☆380Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆120Updated 2 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 6 years ago
- A distributed fuzzing testing suite with web administration☆374Updated 6 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Updated 8 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 4 years ago
- Hodor! Fuzzer..☆129Updated 8 years ago
- 2016 DEF CON Qualifier Challenges☆179Updated 9 years ago
- ☆159Updated 10 years ago
- binary patching from Python☆637Updated last year
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆405Updated 2 years ago
- The Internetwache CTF 2016 repository☆73Updated 4 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago