Gallopsled / pwncryptoLinks
☆20Updated 11 years ago
Alternatives and similar repositories for pwncrypto
Users that are interested in pwncrypto are comparing it to the libraries listed below
Sorting:
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- ☆20Updated 3 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 7 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆62Updated last year
- ☆12Updated 5 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 9 years ago
- All challenges I created for CTF☆12Updated 4 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- CTF tasks created☆11Updated 2 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Updated 9 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆17Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago