corkami / collisions
Hash collisions and exploitations
☆3,145Updated this week
Alternatives and similar repositories for collisions:
Users that are interested in collisions are comparing it to the libraries listed below
- Project HashClash - MD5 & SHA-1 cryptanalysis☆803Updated last month
- Some setup scripts for security research tools.☆8,706Updated last month
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,257Updated this week
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆1,771Updated 3 weeks ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,442Updated 10 months ago
- A powerful and user-friendly binary analysis platform!☆7,772Updated this week
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,584Updated 3 years ago
- A True Instrumentable Binary Emulation Framework☆5,253Updated last week
- Google CTF☆4,605Updated last month
- Portable Executable reversing tool with a friendly GUI☆2,898Updated 2 months ago
- Proof of Concepts (PE, PDF...)☆1,494Updated 2 months ago
- american fuzzy lop - a security-oriented fuzzer☆3,817Updated 3 years ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,049Updated 3 weeks ago
- detect stegano-hidden data in PNG & BMP☆1,363Updated 10 months ago
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,360Updated last year
- CTF framework and exploit development library☆12,358Updated this week
- A curated list of CTF frameworks, libraries, resources and softwares☆10,088Updated 7 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,255Updated 3 months ago
- Firmware Analysis Tool☆12,058Updated 3 weeks ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆5,932Updated 3 months ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆7,260Updated last week
- Course materials for Modern Binary Exploitation by RPISEC☆5,600Updated 3 years ago
- A collection of links related to Linux kernel security and exploitation☆5,786Updated last month
- Ctf solutions from p4 team☆1,795Updated 5 months ago
- PEDA - Python Exploit Development Assistance for GDB☆5,951Updated 6 months ago
- ☆2,674Updated 7 months ago
- Monitor linux processes without root permissions☆5,111Updated 2 years ago
- UNIX-like reverse engineering framework and command-line toolset☆21,193Updated this week
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,133Updated last month
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆8,156Updated this week