☆21Nov 7, 2016Updated 9 years ago
Alternatives and similar repositories for twctf-2016-problems
Users that are interested in twctf-2016-problems are comparing it to the libraries listed below
Sorting:
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- IDA Pro plugin to view Exports☆17Sep 21, 2018Updated 7 years ago
- ☆13Jun 9, 2020Updated 5 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- ☆11May 19, 2017Updated 8 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- various CTF writeups☆61Jun 28, 2018Updated 7 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- DEAD - An archive of my solutions. I'm no longer sure it's wise to publish everything, so I won't be updating this.☆14Oct 1, 2016Updated 9 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 9 years ago
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- PoCs/Examples for my guest post on doar-e☆19Nov 27, 2014Updated 11 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- ☆113Oct 17, 2017Updated 8 years ago
- ☆18Aug 14, 2019Updated 6 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- Hacky little regexp compiler using LLVM☆17Feb 3, 2017Updated 9 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Kudelski Security's 2017 crypto challenge☆20Jul 6, 2017Updated 8 years ago
- ☆17May 13, 2019Updated 6 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 4 months ago
- ☆51Mar 23, 2018Updated 7 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Jan 29, 2015Updated 11 years ago