corkami / collisionsLinks
Hash collisions and exploitations
☆3,282Updated 8 months ago
Alternatives and similar repositories for collisions
Users that are interested in collisions are comparing it to the libraries listed below
Sorting:
- Project HashClash - MD5 & SHA-1 cryptanalysis☆889Updated 5 months ago
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,494Updated last year
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,454Updated last week
- Proof of Concepts (PE, PDF...)☆1,528Updated 10 months ago
- Trojan Source: Invisible Vulnerabilities☆1,272Updated 2 years ago
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆1,992Updated 2 weeks ago
- Quickly find differences and similarities in disassembled code☆2,769Updated 2 weeks ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,273Updated last week
- Google CTF☆4,805Updated 2 weeks ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,236Updated this week
- A repository for learning various heap exploitation techniques.☆8,143Updated last week
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,248Updated 10 months ago
- CTF framework and exploit development library☆12,985Updated last week
- Checksec☆2,225Updated last month
- Diaphora, the most advanced Free and Open Source program diffing tool.☆4,078Updated 11 months ago
- ☆1,150Updated 9 months ago
- A JavaScript Engine Fuzzer☆2,097Updated this week
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,232Updated 10 months ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆2,065Updated last year
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,717Updated last year
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆9,510Updated this week
- Collection of steganography tools - helps with CTF challenges☆2,570Updated 2 years ago
- documentations, slides decks...☆817Updated last year
- A tool to analyze multi-byte xor cipher☆1,460Updated 5 months ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,046Updated 8 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,606Updated last year
- UNIX-like reverse engineering framework and command-line toolset.☆3,140Updated last week
- A True Instrumentable Binary Emulation Framework☆5,659Updated last month
- PEDA - Python Exploit Development Assistance for GDB☆6,056Updated last year
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,587Updated 4 years ago