DarkenCode / yafuLinks
Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu
☆202Updated 3 years ago
Alternatives and similar repositories for yafu
Users that are interested in yafu are comparing it to the libraries listed below
Sorting:
- Working with numbers (primes, modular, etc.)☆243Updated 2 years ago
- CTF writeups from Balsn☆474Updated 3 years ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆329Updated 3 years ago
- Web wrapper of niklasb/libc-database☆204Updated 6 months ago
- 💖CTF pwn framework.☆344Updated 3 years ago
- Collection of scripts and writeups☆323Updated 3 years ago
- A Return-oriented Programming toolkit☆350Updated 8 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆519Updated last year
- Script to setup pwn environment for CTF with Docker☆154Updated 3 years ago
- Small python module for common CTF crypto functions☆167Updated 2 years ago
- 🔍Heap analysis tool for CTF pwn.☆223Updated 4 years ago
- Using Intel's PIN tool to solve CTF problems☆499Updated 5 years ago
- Some pwn challenges selected for training and education.☆384Updated last year
- Simplify format string exploitation.☆339Updated 3 years ago
- CTF framework and exploit development library in python3 (pwntools and binjitsu fork)☆282Updated 5 years ago
- A docker repository for deploying pwnable challenges in CTF☆408Updated 6 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆102Updated 7 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- ☆223Updated 4 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆183Updated 4 years ago
- Some CTF write up☆246Updated 3 years ago
- Basic pwntools for Windows☆263Updated 2 years ago
- official source code of *CTF2019☆224Updated 6 years ago
- A writeup summary for CTF competitions, problems.☆353Updated 9 months ago
- Pure Python hash length extension module☆125Updated 2 years ago
- Implementation of attacks on cryptosystems☆73Updated 4 years ago
- attacking RSA via lattice reductions (LLL)☆798Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago
- A docker environment for pwn in ctf☆764Updated last year