A tool for predicting the output of random number generators
☆194May 7, 2017Updated 8 years ago
Alternatives and similar repositories for foresight
Users that are interested in foresight are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Seed recovery tool for PRNGs☆388Sep 17, 2018Updated 7 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆192Dec 19, 2015Updated 10 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,128Dec 2, 2021Updated 4 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 8 years ago
- ☆236May 31, 2018Updated 7 years ago
- An IDA plugin to demangle Swift function names☆26Apr 23, 2016Updated 10 years ago
- Db Database Assessment Tool☆211Jun 26, 2018Updated 7 years ago
- Some helpful preload libraries for pwning stuff.☆1,647Mar 6, 2026Updated last month
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Go library and command line to seek for secrets on various sources.☆242Nov 14, 2019Updated 6 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Scripts for ElasticSearch vulns☆13Oct 17, 2015Updated 10 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆509May 11, 2021Updated 4 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 12 years ago
- A tool for enumerating expired domains in CNAME records☆59Jun 30, 2016Updated 9 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 11 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- ☆90Mar 15, 2017Updated 9 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- peinjector - MITM PE file infector☆610May 11, 2016Updated 9 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆323May 9, 2016Updated 9 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 12 years ago
- x64dbg Malware Plugin. Detect malicious materials☆16Jun 13, 2020Updated 5 years ago