Seed recovery tool for PRNGs
☆388Sep 17, 2018Updated 7 years ago
Alternatives and similar repositories for untwister
Users that are interested in untwister are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Seed recovery tool for PRNGs☆41Nov 13, 2016Updated 9 years ago
- A tool for predicting the output of random number generators☆193May 7, 2017Updated 8 years ago
- Infer internal state of Mersenne Twister from truncated output☆77Jul 28, 2022Updated 3 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- A tool for performing network timing attacks on plaintext and hashed password authentication.☆21May 30, 2013Updated 12 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,125Dec 2, 2021Updated 4 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 12 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- SMT based attacks on non cryptographic PRNGs☆91Mar 23, 2023Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,003Aug 27, 2022Updated 3 years ago
- Some helpful preload libraries for pwning stuff.☆1,649Mar 6, 2026Updated last month
- Simplify format string exploitation.☆348Nov 2, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,400Dec 16, 2025Updated 3 months ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,962Dec 9, 2021Updated 4 years ago
- A repository for learning various heap exploitation techniques.☆8,583Mar 26, 2026Updated 2 weeks ago
- A Coverage Explorer for Reverse Engineers☆2,532Feb 14, 2026Updated last month
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Visualization of heap operations.☆616Dec 5, 2024Updated last year
- ☆1,193Jan 27, 2025Updated last year
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,619Jun 11, 2025Updated 9 months ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AFL/QEMU fuzzing with full-system emulation.☆642Sep 9, 2018Updated 7 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,325Mar 26, 2026Updated 2 weeks ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Aug 28, 2022Updated 3 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago