CTF writeups
☆12Aug 10, 2020Updated 5 years ago
Alternatives and similar repositories for CTF-writeups
Users that are interested in CTF-writeups are comparing it to the libraries listed below
Sorting:
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- Everything about TSG CTF 2020☆25Jul 2, 2021Updated 4 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆28Oct 7, 2021Updated 4 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- Android web based memory scanner & editor.☆19Oct 3, 2023Updated 2 years ago
- Using SVF in Python Projects☆15Feb 26, 2026Updated last week
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆40Aug 1, 2020Updated 5 years ago
- Process memory editing library for Linux☆10Oct 26, 2021Updated 4 years ago
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- Status bar using web technologies.☆12Jan 14, 2021Updated 5 years ago
- Nitrokey 3 USB-A NFC LPC55 hardware☆19May 31, 2022Updated 3 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 8 months ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- ☆11Feb 3, 2026Updated last month
- derper's mom☆13Oct 28, 2025Updated 4 months ago
- ☆10Nov 23, 2021Updated 4 years ago
- View instruction register through GameGuardian !☆14Dec 8, 2019Updated 6 years ago
- ☆10Dec 27, 2018Updated 7 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- Penguin Xposed Framework☆10Apr 15, 2019Updated 6 years ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- based on Differential Cryptanalysis of the Full 16-round DES(Eli Biham / Adi Shamir), all comments and report are written in Korean.☆10Dec 19, 2022Updated 3 years ago
- xdelta3 so lib for android☆11Nov 14, 2013Updated 12 years ago
- DevFest Gandhinagar 2019 App☆12Oct 10, 2019Updated 6 years ago
- Advanced Sub-domain Enumerator☆10Mar 14, 2020Updated 5 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Sep 4, 2021Updated 4 years ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Jul 25, 2015Updated 10 years ago
- libtcpsocket is a tcp socket library for IPV4 and IPV6☆10Jul 18, 2014Updated 11 years ago
- ☆11Nov 1, 2023Updated 2 years ago
- Unofficial Scalable-Softmax Is Superior for Attention☆20May 30, 2025Updated 9 months ago
- ☆20Oct 24, 2024Updated last year
- Fast Subdomain Enumeration Tool made with Bash only 💯☆15Nov 3, 2021Updated 4 years ago