Gallopsled / pwncryptoLinks
☆20Updated 11 years ago
Alternatives and similar repositories for pwncrypto
Users that are interested in pwncrypto are comparing it to the libraries listed below
Sorting:
- #INFILTRATE19 raptor's party pack.☆32Updated last week
- ☆21Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- All challenges I created for CTF☆12Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Firmware analysis website + API☆43Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- CTF tasks created☆11Updated 2 years ago
- Simple vulnerability scanning framework☆51Updated 9 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- This repository holds interesting bits and pieces related to research I performed on wireless presentation devices manufactured by Awindi…☆13Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- ☆17Updated 7 years ago
- hax 'n shit☆121Updated 10 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 9 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 2 months ago
- PoC for Foxit Reader CVE-2018-14442☆57Updated 6 years ago