corkami / collisionsLinks
Hash collisions and exploitations
☆3,318Updated 11 months ago
Alternatives and similar repositories for collisions
Users that are interested in collisions are comparing it to the libraries listed below
Sorting:
- Project HashClash - MD5 & SHA-1 cryptanalysis☆908Updated 8 months ago
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆2,059Updated 2 months ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,527Updated this week
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,525Updated last year
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆9,914Updated this week
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,593Updated 4 years ago
- Proof of Concepts (PE, PDF...)☆1,532Updated last year
- CTF framework and exploit development library☆13,190Updated this week
- detect stegano-hidden data in PNG & BMP☆1,535Updated 5 months ago
- Google CTF☆4,887Updated 3 weeks ago
- Collection of steganography tools - helps with CTF challenges☆2,624Updated 3 years ago
- ☆1,172Updated 11 months ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,353Updated last month
- PEDA - Python Exploit Development Assistance for GDB☆6,094Updated last year
- Tutorials for getting started with Pwntools☆1,537Updated last year
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,263Updated last year
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,688Updated last year
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆7,977Updated 2 weeks ago
- ☆2,894Updated last year
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,711Updated last month
- A repository for learning various heap exploitation techniques.☆8,394Updated last week
- UNIX-like reverse engineering framework and command-line toolset.☆3,312Updated this week
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,330Updated 8 months ago
- Magic hashes – PHP hash "collisions"☆814Updated 10 months ago
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,835Updated 4 years ago
- Trojan Source: Invisible Vulnerabilities☆1,275Updated 2 years ago
- Checksec☆2,271Updated 3 weeks ago
- A tool to analyze multi-byte xor cipher☆1,471Updated 8 months ago
- Perfect Blue's CTF Writeups☆694Updated last year
- A powerful and user-friendly binary analysis platform!☆8,432Updated this week