corkami / collisionsLinks
Hash collisions and exploitations
☆3,237Updated 5 months ago
Alternatives and similar repositories for collisions
Users that are interested in collisions are comparing it to the libraries listed below
Sorting:
- Project HashClash - MD5 & SHA-1 cryptanalysis☆859Updated 3 months ago
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆1,907Updated last month
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,409Updated this week
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,437Updated last year
- Proof of Concepts (PE, PDF...)☆1,518Updated 7 months ago
- Quickly find differences and similarities in disassembled code☆2,654Updated 3 weeks ago
- Checksec☆2,190Updated this week
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆2,044Updated 9 months ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆7,662Updated 2 months ago
- Google CTF☆4,756Updated 7 months ago
- detect stegano-hidden data in PNG & BMP☆1,435Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,123Updated this week
- ☆1,138Updated 6 months ago
- documentations, slides decks...☆805Updated last year
- Trojan Source: Invisible Vulnerabilities☆1,265Updated 2 years ago
- A True Instrumentable Binary Emulation Framework☆5,560Updated last month
- Diaphora, the most advanced Free and Open Source program diffing tool.☆3,970Updated 8 months ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆9,035Updated this week
- Collection of steganography tools - helps with CTF challenges☆2,547Updated 2 years ago
- A tool to analyze multi-byte xor cipher☆1,446Updated 2 months ago
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,685Updated 9 months ago
- Extract files from any kind of container formats☆2,346Updated last week
- CTF framework and exploit development library☆12,771Updated this week
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,425Updated last year
- Program for determining types of files for Windows, Linux and MacOS.☆9,125Updated this week
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,208Updated 7 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,548Updated last year
- ☆2,784Updated last year
- UNIX-like reverse engineering framework and command-line toolset.☆3,006Updated this week
- PEDA - Python Exploit Development Assistance for GDB☆6,020Updated last year