Seed recovery tool for PRNGs
☆390Sep 17, 2018Updated 7 years ago
Alternatives and similar repositories for untwister
Users that are interested in untwister are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for predicting the output of random number generators☆193May 7, 2017Updated 9 years ago
- Infer internal state of Mersenne Twister from truncated output☆77Jul 28, 2022Updated 3 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 3 years ago
- A tool for performing network timing attacks on plaintext and hashed password authentication.☆21May 30, 2013Updated 12 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,130Dec 2, 2021Updated 4 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 12 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- SMT based attacks on non cryptographic PRNGs☆94Mar 23, 2023Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- Some helpful preload libraries for pwning stuff.☆1,649Mar 6, 2026Updated 2 months ago
- Simplify format string exploitation.☆347Nov 2, 2021Updated 4 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- dynamic binary analysis via platform emulation☆905Jun 1, 2023Updated 2 years ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,418Dec 16, 2025Updated 5 months ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,973Dec 9, 2021Updated 4 years ago
- A repository for learning various heap exploitation techniques.☆8,650Updated this week
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 7 years ago
- A Coverage Explorer for Reverse Engineers☆2,543Feb 14, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Visualization of heap operations.☆617Dec 5, 2024Updated last year
- ☆1,199Jan 27, 2025Updated last year
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆228Jan 4, 2021Updated 5 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,617Jun 11, 2025Updated 11 months ago
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- AFL/QEMU fuzzing with full-system emulation.☆642Sep 9, 2018Updated 7 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,347Apr 13, 2026Updated last month
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Aug 28, 2022Updated 3 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago