Merricx / qrazyboxLinks
QR Code Analysis and Recovery Toolkit
☆483Updated 2 months ago
Alternatives and similar repositories for qrazybox
Users that are interested in qrazybox are comparing it to the libraries listed below
Sorting:
- A web-based, accessible and open-source port of StegSolve.☆361Updated last year
- Predict python's random module generated values.☆422Updated 11 months ago
- Automated integer factorization☆296Updated this week
- ☆265Updated 2 years ago
- PCRT (PNG Check & Repair Tool), a tool to help check and fix the error in a PNG image.☆249Updated 3 years ago
- pkcrack with modern building tools☆198Updated 3 years ago
- Easily detect and restore Acropalypse vulnerable PNG and GIF files with simple Python GUI.☆147Updated last year
- Project HashClash - MD5 & SHA-1 cryptanalysis☆889Updated 5 months ago
- USB mouse traffic packet forensic tool, mainly used to draw mouse movements and dragging trajectories☆273Updated last year
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆192Updated 4 years ago
- detect stegano-hidden data in PNG & BMP☆1,490Updated 2 months ago
- SSTV Decoder☆254Updated 5 years ago
- ☆194Updated 8 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆530Updated last year
- CRC32 tools: reverse, undo/rewind, and calculate hashes☆374Updated last year
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆1,992Updated 2 weeks ago
- Decode All Bases - Base Scheme Decoder☆573Updated 2 years ago
- A steganography tool for embedding payloads within Python bytecode.☆151Updated 5 years ago
- F5 steganography☆255Updated 3 years ago
- Flask Session Cookie Decoder/Encoder☆742Updated 8 months ago
- USB键盘流量包取证工具 , 用于恢复用户的击键信息☆374Updated last year
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Updated 8 years ago
- CTFd plugin that allows your users to have exclusive environments for each challenge, with dynamic flags.☆160Updated 9 months ago
- LSB steganography and detection☆622Updated 5 years ago
- attacking RSA via lattice reductions (LLL)☆819Updated 4 years ago
- Challenges I created for CTF competitions.☆225Updated 2 months ago
- Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.☆595Updated 10 months ago
- Steganalysis web platform☆717Updated 3 months ago
- A docker environment for pwn in ctf☆787Updated last month
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack. 使用明文攻击破解加密的 zip 文件☆108Updated 2 years ago