corkami / collisionsLinks
Hash collisions and exploitations
☆3,303Updated 9 months ago
Alternatives and similar repositories for collisions
Users that are interested in collisions are comparing it to the libraries listed below
Sorting:
- Project HashClash - MD5 & SHA-1 cryptanalysis☆898Updated 7 months ago
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,515Updated last year
- Proof of Concepts (PE, PDF...)☆1,530Updated 11 months ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆9,699Updated this week
- ☆2,873Updated last year
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,819Updated 6 years ago
- Google CTF☆4,857Updated last month
- ☆1,158Updated 10 months ago
- A repository for learning various heap exploitation techniques.☆8,278Updated last week
- CTF framework and exploit development library☆13,078Updated 2 weeks ago
- Tutorials for getting started with Pwntools☆1,527Updated last year
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,318Updated 2 weeks ago
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆2,021Updated 3 weeks ago
- Collection of steganography tools - helps with CTF challenges☆2,581Updated 3 years ago
- Checksec☆2,250Updated last week
- The best tool for finding one gadget RCE in libc.so.6☆2,259Updated last month
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,642Updated last year
- detect stegano-hidden data in PNG & BMP☆1,516Updated 4 months ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,592Updated 4 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,069Updated 9 months ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,599Updated last month
- Build a database of libc offsets to simplify exploitation☆1,840Updated last year
- Perfect Blue's CTF Writeups☆692Updated last year
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,491Updated this week
- pwninit - automate starting binary exploit challenges☆1,035Updated last year
- A sorted and updated list of security wargame sites.☆1,117Updated last month
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆7,890Updated this week
- A tool to analyze multi-byte xor cipher☆1,466Updated 6 months ago
- Some setup scripts for security research tools.☆9,210Updated 3 weeks ago
- A set of security related tools☆679Updated 4 years ago