Cryptography Tool | RSA Attacks
☆109Jun 4, 2023Updated 2 years ago
Alternatives and similar repositories for X-RSA
Users that are interested in X-RSA are comparing it to the libraries listed below
Sorting:
- Simplified MITRE Use Cases, it describes the Attack and Detection☆49Sep 29, 2020Updated 5 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆20Jun 8, 2021Updated 4 years ago
- An open-source SBox analysis utility☆19Mar 25, 2025Updated 11 months ago
- Regexplore is a Volatility plugin designed to mimic the functionality of the Registry Explorer plugins in EZsuite☆18Mar 31, 2023Updated 2 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 4 months ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Python implementations of cryptographic attacks and utilities.☆1,242Jan 8, 2026Updated 2 months ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Dec 31, 2018Updated 7 years ago
- RSHack - Tool for RSA CTF's challenges☆98Nov 19, 2018Updated 7 years ago
- ☆29May 11, 2025Updated 10 months ago
- ctf solutions☆81Apr 2, 2024Updated last year
- 自带GUI的SQL盲注流量一把梭小工具尝试版☆21Feb 24, 2024Updated 2 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- MySQL Injection Exfoliation Optimization☆24Sep 15, 2019Updated 6 years ago
- Collection of my volatility3 plugins☆18Sep 6, 2024Updated last year
- ☆15Sep 2, 2024Updated last year
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- ☆13Mar 20, 2021Updated 5 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆75Oct 18, 2018Updated 7 years ago
- A Retro Styled CTFd Theme☆180Dec 9, 2022Updated 3 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆22Mar 24, 2021Updated 4 years ago
- ☆11Apr 11, 2020Updated 5 years ago
- Hopefully working edl tools for oneplus 12r☆13Dec 5, 2024Updated last year
- CTFd Theme for StormCTF (Updated a little bit for the newest version of CTFd)☆12May 19, 2019Updated 6 years ago
- A way to control devices via Bluetooth w/ an ESP32☆14Jul 6, 2024Updated last year
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- My solutions for CTF & wargame challenges☆89Jan 29, 2026Updated last month
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.☆18Mar 2, 2026Updated 2 weeks ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)☆23Apr 21, 2022Updated 3 years ago
- Writeup CTF☆22Feb 17, 2022Updated 4 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆143Mar 13, 2024Updated 2 years ago
- gemastik-xvii-final public repository☆22Oct 24, 2024Updated last year
- IDA plugin for auto rename symbol☆15Jan 16, 2025Updated last year