Hash collisions and exploitations
☆3,349Feb 20, 2025Updated last year
Alternatives and similar repositories for collisions
Users that are interested in collisions are comparing it to the libraries listed below
Sorting:
- Project HashClash - MD5 & SHA-1 cryptanalysis☆927May 7, 2025Updated 10 months ago
- Proof of Concepts (PE, PDF...)☆1,540Dec 22, 2024Updated last year
- A repository for learning various heap exploitation techniques.☆8,475Jan 15, 2026Updated 2 months ago
- CTF framework and exploit development library☆13,315Mar 5, 2026Updated 2 weeks ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,051Mar 11, 2026Updated last week
- File formats dissections and more...☆11,419Feb 18, 2024Updated 2 years ago
- documentations, slides decks...☆825May 4, 2024Updated last year
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,197Updated this week
- The best tool for finding one gadget RCE in libc.so.6☆2,304Mar 5, 2026Updated 2 weeks ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,816Mar 3, 2026Updated 2 weeks ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,829Mar 2, 2026Updated 2 weeks ago
- Google CTF☆4,916Feb 11, 2026Updated last month
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆52,887Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- A True Instrumentable Binary Emulation Framework☆5,840Nov 5, 2025Updated 4 months ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,386Dec 16, 2025Updated 3 months ago
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,552Feb 11, 2024Updated 2 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,103Feb 28, 2025Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,106Updated this week
- UNIX-like reverse engineering framework and command-line toolset☆23,269Updated this week
- Some setup scripts for security research tools.☆9,323Mar 1, 2026Updated 2 weeks ago
- Collection of CTF Web challenges I made☆2,822Aug 31, 2025Updated 6 months ago
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,768Sep 29, 2025Updated 5 months ago
- Ghidra is a software reverse engineering (SRE) framework☆65,820Updated this week
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,812Dec 4, 2025Updated 3 months ago
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,254Mar 5, 2025Updated last year
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,271Dec 22, 2024Updated last year
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆6,389Updated this week
- A powerful and user-friendly binary analysis platform!☆8,546Mar 14, 2026Updated last week
- Fast web fuzzer written in Go☆15,750Apr 24, 2025Updated 10 months ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,600Jun 19, 2021Updated 4 years ago
- Pwn stuff.☆1,804May 31, 2022Updated 3 years ago
- Web CTF CheatSheet 🐈☆2,944Oct 28, 2025Updated 4 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,390Updated this week
- A collection of links related to VMware escape exploits☆1,495Sep 4, 2024Updated last year
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆34,303Mar 11, 2026Updated last week
- A little tool to play with Windows security☆21,334May 11, 2025Updated 10 months ago
- Build a database of libc offsets to simplify exploitation☆1,855Oct 23, 2024Updated last year