☆21Feb 20, 2014Updated 12 years ago
Alternatives and similar repositories for pwncrypto
Users that are interested in pwncrypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆12Nov 26, 2025Updated 3 months ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- Interface GDB-GEF with Binary Ninja☆58Mar 27, 2021Updated 4 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- A training course for BambooFox☆25Mar 18, 2016Updated 10 years ago
- ☆45Jan 6, 2026Updated 2 months ago
- ☆12Feb 20, 2021Updated 5 years ago
- talking LED mask for BSides 2020 presenters☆22Dec 19, 2020Updated 5 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Nginx OCSP processing module designed for response caching☆11Mar 24, 2014Updated 12 years ago
- GitHub Pages for Kernel Self Protection Project☆23Nov 8, 2025Updated 4 months ago
- files for (μ)scope projects☆11Jul 8, 2019Updated 6 years ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- Security attack and protection☆22Nov 2, 2017Updated 8 years ago
- A colleciton of CTF write-ups all using pwntools☆520Oct 5, 2016Updated 9 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- Python bit pattern library for instruction encodings. Bytes in, IR out!☆15Mar 6, 2022Updated 4 years ago
- ☆11Nov 19, 2017Updated 8 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- μBlaze Architecture Plugin for Binary Ninja☆11May 29, 2022Updated 3 years ago
- A Windows GPU Miner for Sia☆12Jun 28, 2016Updated 9 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Simple CVE-2021-20294 poc☆11Jan 21, 2023Updated 3 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- DEA (disposable email address) JSON / GRPC API☆28Apr 19, 2023Updated 2 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 4 years ago
- ☆11Nov 21, 2020Updated 5 years ago
- ☆12Dec 20, 2023Updated 2 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- A small group for NCU students who want to learn Hacking.☆12Dec 17, 2017Updated 8 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- ☆22Dec 1, 2021Updated 4 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- A C implementation of AES got from OpenSSL☆14Dec 19, 2011Updated 14 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago