AdamLaurie / cribtasticLinks
A cryptographic crib maniplation tool
☆20Updated 12 years ago
Alternatives and similar repositories for cribtastic
Users that are interested in cribtastic are comparing it to the libraries listed below
Sorting:
- Memory awesomeness.☆29Updated 10 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- ☆26Updated 8 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- CTF writeups☆13Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- Samples of binary with different formats and architectures. A test suite for your binary analysis tools.☆22Updated 11 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- ☆36Updated 12 years ago
- CTF Finals☆17Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Routines for hunting down kernel structs.☆41Updated 13 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- library to decode/parse zeus-like configuration files☆29Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Python repository containing parsed standard C library function and argument information☆26Updated 6 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- ☆24Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- ☆14Updated 4 years ago
- POLAR☆73Updated 6 years ago
- TrueType Font Fuzzer☆53Updated 9 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 7 years ago