learn pwn
☆17May 30, 2020Updated 5 years ago
Alternatives and similar repositories for pwn
Users that are interested in pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆20Mar 26, 2025Updated last year
- ☆14Jul 3, 2020Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Jul 1, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 2023 第七届强网杯全国网络安全挑战赛☆30Dec 18, 2023Updated 2 years ago
- Gscan二开版☆12Apr 11, 2024Updated 2 years ago
- ☆10Feb 2, 2020Updated 6 years ago
- Tool to brute-force the passphrase of a RSA private key in PEM format.☆12Dec 11, 2014Updated 11 years ago
- records of my daily sec learning☆13Mar 20, 2020Updated 6 years ago
- 记录代码审计学习的过程,附含源码☆11Jan 18, 2021Updated 5 years ago
- A minimalist waker for async-await executors☆15Jul 16, 2022Updated 3 years ago
- NanoOS - A OS☆18Apr 13, 2020Updated 6 years ago
- Challenges for INShAck☆20Apr 10, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- WriteUps for CTF☆10Nov 13, 2024Updated last year
- ☆15Mar 14, 2023Updated 3 years ago
- The Road to SDN @ FuZhou University☆15Mar 22, 2018Updated 8 years ago
- Sentinel Guard - Use to build up Honeypot and Honeynet with ZERO cost easily and simply.☆18Jul 25, 2021Updated 4 years ago
- It's an RSA-cracker, that uses Fermat's factorization method to get p and q.☆15Dec 19, 2015Updated 10 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- 17mon ip库查询☆34Jul 5, 2018Updated 7 years ago
- cryptocrack 是一个用Python编写的密码自动破解框架,在basecrack的基础上进行功能完善,期望解决CTF中Crypto部分题型☆14Jan 6, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Scantime Crypter coded in Python 2.7☆15Aug 26, 2017Updated 8 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- An x86-64 instruction decoder.☆16Mar 11, 2024Updated 2 years ago
- A selection of Brazilian Portuguese words that are good enough to be used as a BIP-0039 wordlist☆16Sep 3, 2015Updated 10 years ago
- DigDog-基于深度学习和内存取证技术的恶意软件检测框架☆10Mar 14, 2023Updated 3 years ago
- 该资源为作者CTF学习Web类型题目解题思路,希望对您有所帮助~☆12Jun 13, 2020Updated 5 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Apr 29, 2019Updated 7 years ago
- create concept map from textbook data☆11May 4, 2018Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- Fuzzy test rules (include Sqli xss Lfi and so on)☆17Nov 7, 2017Updated 8 years ago
- Some crypto scripts which is useful in study and ctf☆28Sep 2, 2021Updated 4 years ago
- LITCTF OF ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY☆13Nov 17, 2023Updated 2 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆35Sep 5, 2024Updated last year
- ☆10Feb 3, 2021Updated 5 years ago
- ioring wrapper for windows-rs☆24Oct 2, 2022Updated 3 years ago