altf4 / untwisterLinks
Seed recovery tool for PRNGs
☆380Updated 6 years ago
Alternatives and similar repositories for untwister
Users that are interested in untwister are comparing it to the libraries listed below
Sorting:
- ☆680Updated 2 months ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- A tool for predicting the output of random number generators☆193Updated 8 years ago
- Simplify format string exploitation.☆339Updated 3 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆179Updated 10 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆391Updated 2 years ago
- Seed recovery tool for PRNGs☆84Updated 9 years ago
- Using Intel's PIN tool to solve CTF problems☆501Updated 5 years ago
- Factoring as a Service☆265Updated 3 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,110Updated 3 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 4 years ago
- Small python module for common CTF crypto functions☆167Updated 2 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆656Updated last year
- CTF write-ups by Plaid Parliament of Pwning☆785Updated last year
- A web UI and server for task based competitions employing Etherpad Lite.☆112Updated 6 years ago
- Working with numbers (primes, modular, etc.)☆243Updated 2 years ago
- A TCP/UDP based network daemon fuzzer☆520Updated last year
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆386Updated 2 years ago
- CTF Writeups☆186Updated 7 years ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆329Updated 3 years ago
- ☆280Updated 5 years ago
- A colleciton of CTF write-ups all using pwntools☆513Updated 8 years ago
- An abstraction layer for constraint solvers.☆313Updated this week
- A portable, padding oracle exploit API☆326Updated 2 years ago
- Pure Python hash length extension module☆125Updated 2 years ago
- Visualization of heap operations.☆610Updated 6 months ago
- The 'exploitable' GDB plugin☆733Updated 2 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆235Updated 3 months ago
- ☆77Updated 10 years ago