corkami / collisions
Hash collisions and exploitations
☆3,193Updated 2 months ago
Alternatives and similar repositories for collisions
Users that are interested in collisions are comparing it to the libraries listed below
Sorting:
- Project HashClash - MD5 & SHA-1 cryptanalysis☆843Updated last week
- Proof of Concepts (PE, PDF...)☆1,501Updated 4 months ago
- Gather and update all available and newest CVEs with their PoC.☆6,965Updated this week
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆8,604Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆9,842Updated last week
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,342Updated last week
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆1,860Updated 3 months ago
- ☆2,724Updated 10 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,456Updated 11 months ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆7,506Updated last week
- PEDA - Python Exploit Development Assistance for GDB☆6,001Updated 9 months ago
- Collection of steganography tools - helps with CTF challenges☆2,517Updated 2 years ago
- A collection of links related to Linux kernel security and exploitation☆5,941Updated last week
- UNIX-like reverse engineering framework and command-line toolset.☆2,916Updated last week
- ☆2,505Updated 2 years ago
- detect stegano-hidden data in PNG & BMP☆1,414Updated last year
- A tool to analyze multi-byte xor cipher☆1,432Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆7,673Updated 3 weeks ago
- A curated list of awesome reversing resources☆4,260Updated last year
- CTF framework and exploit development library☆12,593Updated 3 weeks ago
- Google CTF☆4,668Updated 4 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆5,821Updated 2 weeks ago
- ☆1,121Updated 3 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,605Updated 6 months ago
- Tutorials for getting started with Pwntools☆1,468Updated 7 months ago
- Diaphora, the most advanced Free and Open Source program diffing tool.☆3,858Updated 5 months ago
- An OOB interaction gathering server and client library☆3,765Updated last week
- Portable Executable reversing tool with a friendly GUI☆3,080Updated 3 weeks ago
- Quickly find differences and similarities in disassembled code☆2,544Updated last month
- Ctf solutions from p4 team☆1,809Updated 8 months ago