arisada / dualec_pocLinks
This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg
☆52Updated 11 years ago
Alternatives and similar repositories for dualec_poc
Users that are interested in dualec_poc are comparing it to the libraries listed below
Sorting:
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Symbol REPL☆31Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ☆35Updated 13 years ago
- Research on WebAssembly☆41Updated 3 years ago
- Tool to view heap chunks and memory writes (using pintool)☆41Updated 6 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆80Updated 10 years ago
- Diaphora, a Free and Open Source program diffing tool☆23Updated 6 years ago
- A smart file fuzzer.☆26Updated 9 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- REIL translation library☆36Updated 9 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 7 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆75Updated 6 years ago
- ELF/PE/Mach-O parsing library☆50Updated last year
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- ☆24Updated 10 years ago
- ☆26Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago