A small python library for exploiting simple chosen-plaintext attacks.
☆40May 3, 2014Updated 11 years ago
Alternatives and similar repositories for chosen-plaintext
Users that are interested in chosen-plaintext are comparing it to the libraries listed below
Sorting:
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- TLS SNIp - Rule based proxy for routing/filtering TLS/SSL protocols.☆13May 3, 2017Updated 8 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- Basic raw packet sniffer in Python - Cybrary☆12Nov 21, 2017Updated 8 years ago
- Fuzzing framework written in OCaml☆33Aug 23, 2016Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- A sandboxed Python subset for safe evaluation☆32Jun 28, 2022Updated 3 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- ☆16May 15, 2021Updated 4 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- ☆40Apr 21, 2015Updated 10 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Oct 6, 2017Updated 8 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- Symbolic Execution over Falcon IL☆30Aug 28, 2021Updated 4 years ago
- ☆30Jan 6, 2021Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- ☆26Mar 12, 2020Updated 5 years ago
- Example Manticore scripts☆68Dec 7, 2023Updated 2 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- Lazy python wrapper of KLEE for solving CTF challenges☆64Oct 31, 2020Updated 5 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- Exploiting HID VertX and EDGE access control systems☆24Jan 17, 2017Updated 9 years ago
- Example of building and running an eBPF program in Rust☆33Sep 27, 2018Updated 7 years ago
- DSC Module to manage Windows Event Forwarding☆23Sep 22, 2018Updated 7 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Aug 9, 2017Updated 8 years ago
- A reader-writer lock that can be used with a Condvar.☆29Jun 2, 2016Updated 9 years ago