Gallopsled / pwncryptoLinks
☆20Updated 11 years ago
Alternatives and similar repositories for pwncrypto
Users that are interested in pwncrypto are comparing it to the libraries listed below
Sorting:
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- ☆12Updated 5 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- All challenges I created for CTF☆12Updated 4 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- ☆26Updated 3 years ago
- ☆20Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- ☆1Updated 6 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆27Updated 2 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- CTF tasks created☆11Updated 2 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago