corkami / collisions
Hash collisions and exploitations
☆3,087Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for collisions
- Google CTF☆4,540Updated last week
- detect stegano-hidden data in PNG & BMP☆1,328Updated 8 months ago
- Project HashClash - MD5 & SHA-1 cryptanalysis☆771Updated 2 months ago
- CTF framework and exploit development library☆12,144Updated 3 weeks ago
- Proof of Concepts (PE, PDF...)☆1,477Updated last year
- Checksec☆2,034Updated 3 weeks ago
- A repository with 3 tools for pwn'ing websites with .git repositories available☆3,866Updated last year
- Exploit Development and Reverse Engineering with GDB Made Easy☆7,678Updated this week
- PEDA - Python Exploit Development Assistance for GDB☆5,901Updated 3 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,481Updated 2 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,246Updated 5 months ago
- Monitor linux processes without root permissions☆4,975Updated last year
- Collection of steganography tools - helps with CTF challenges☆2,409Updated last year
- A tool to analyze multi-byte xor cipher☆1,399Updated last year
- A tool to dump the login password from the current linux user☆3,820Updated last year
- ☆1,088Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆10,924Updated 3 weeks ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆5,757Updated last week
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,580Updated last month
- Various *nix tools built as statically-linked binaries☆3,195Updated last year
- A repository for learning various heap exploitation techniques.☆7,243Updated 2 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆3,942Updated 3 months ago
- Ctf solutions from p4 team☆1,776Updated 2 months ago
- ☆2,493Updated last year
- Linux privilege escalation auditing tool☆5,666Updated 9 months ago
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆1,677Updated last month
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,135Updated 2 months ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆7,021Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,529Updated 4 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆1,982Updated last month