abpolym / crypto-tools
Some crypto tools I've written
☆31Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for crypto-tools
- Writeups for CTF competitions.☆32Updated 8 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆27Updated 3 years ago
- Python Web framework P0wner☆75Updated 11 years ago
- X-CTF 2016 Qualifiers Challenges Source☆12Updated 8 years ago
- CTF tools for RSA☆46Updated 8 years ago
- ☆84Updated 7 years ago
- ☆88Updated 3 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Learn binary exploitation from angelboy's hitcon-training☆33Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Updated 8 years ago
- ☆19Updated 10 years ago
- ☆45Updated 8 years ago
- Yet another CTF platform☆147Updated 6 years ago
- 之Crypto☆41Updated 7 years ago
- fuzz☆125Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Updated 8 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆114Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆90Updated 11 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆44Updated 10 years ago
- PowerShell module for the exploitation and testing☆16Updated 9 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆53Updated 2 years ago