BishopFox / untwister
Seed recovery tool for PRNGs
☆84Updated 9 years ago
Alternatives and similar repositories for untwister
Users that are interested in untwister are comparing it to the libraries listed below
Sorting:
- A program to draw rectangles from heap traces.☆133Updated 5 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 9 months ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- grap: define and match graph patterns within binaries☆171Updated 4 years ago
- ☆21Updated 7 years ago
- ☆49Updated 7 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Research on WebAssembly☆40Updated 2 years ago
- Seed recovery tool for PRNGs☆381Updated 6 years ago
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago
- A Python tool to generate ROP chains☆63Updated 3 months ago
- Library for creating CTF services.☆74Updated 8 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆140Updated 4 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Updated 9 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- Advanced buffer overflow and memory corruption security challenges☆188Updated 3 years ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆45Updated 6 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 7 years ago
- ☆16Updated 6 years ago