corkami / collisionsLinks
Hash collisions and exploitations
☆3,306Updated 10 months ago
Alternatives and similar repositories for collisions
Users that are interested in collisions are comparing it to the libraries listed below
Sorting:
- Project HashClash - MD5 & SHA-1 cryptanalysis☆900Updated 7 months ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,508Updated this week
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆2,041Updated last month
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,519Updated last year
- Proof of Concepts (PE, PDF...)☆1,534Updated last year
- Trojan Source: Invisible Vulnerabilities☆1,272Updated 2 years ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,532Updated last year
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,661Updated last year
- Quickly find differences and similarities in disassembled code☆2,841Updated last month
- Extract files from any kind of container formats☆2,411Updated last week
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,736Updated last year
- ☆1,165Updated 11 months ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆9,782Updated this week
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,257Updated last year
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,339Updated last week
- Checksec☆2,260Updated last week
- detect stegano-hidden data in PNG & BMP☆1,522Updated 4 months ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆7,933Updated 3 weeks ago
- PEDA - Python Exploit Development Assistance for GDB☆6,092Updated last year
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,250Updated last year
- Python implementations of cryptographic attacks and utilities.☆1,212Updated 11 months ago
- Google CTF☆4,867Updated last week
- A repository for learning various heap exploitation techniques.☆8,345Updated 3 weeks ago
- documentations, slides decks...☆820Updated last year
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,811Updated 4 years ago
- A collection of links related to Linux kernel security and exploitation☆6,277Updated last month
- Collection of steganography tools - helps with CTF challenges☆2,587Updated 3 years ago
- ☆1,505Updated 3 years ago
- ☆2,885Updated last year
- ☆2,511Updated 2 years ago