EiNSTeiN- / chosen-plaintext
A small python library for exploiting simple chosen-plaintext attacks.
☆40Updated 10 years ago
Alternatives and similar repositories for chosen-plaintext:
Users that are interested in chosen-plaintext are comparing it to the libraries listed below
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Helper script for working with format string bugs☆57Updated 4 years ago
- Simple shellcode testing tool.☆48Updated 13 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- 🏴 Collection of CTF solutions☆75Updated 5 years ago
- Writeups for CTF competitions.☆32Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 6 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Exploits for interesting CTF challenges I have worked on☆64Updated 8 years ago
- ☆16Updated 6 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- ☆89Updated 7 months ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆43Updated 7 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆102Updated 7 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- CTF writeups☆112Updated 7 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- ☆21Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 8 years ago
- ☆96Updated 3 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- ☆77Updated 9 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Updated 8 years ago
- Exploit collection for NT privilege escalation☆66Updated 9 years ago