corkami / mitra
A generator of weird files (binary polyglots, near polyglots, polymocks...)
☆1,207Updated 2 months ago
Alternatives and similar repositories for mitra:
Users that are interested in mitra are comparing it to the libraries listed below
- ☆1,115Updated 4 years ago
- 🐧 Abuse of Google Colab for cracking hashes.☆938Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,283Updated 2 months ago
- pwninit - automate starting binary exploit challenges☆915Updated 6 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,530Updated last year
- Fancy reverse and bind shell handler☆2,709Updated 6 months ago
- Katana - Automatic CTF Challenge Solver in Python3☆1,288Updated 11 months ago
- A collection of pwn/CTF related utilities for Ghidra☆665Updated 5 months ago
- Reverse proxies cheatsheet☆1,800Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,830Updated 2 years ago
- Collection of steganography tools - helps with CTF challenges☆2,464Updated 2 years ago
- Steganalysis web platform☆567Updated last month
- Example pwnable challenge hosted with docker☆218Updated last year
- A tool to analyze multi-byte xor cipher☆1,422Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆534Updated last week
- Yet another Stego Tool☆371Updated last year
- Chepy is a python lib/cli equivalent of the awesome CyberChef tool.☆960Updated 2 weeks ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,324Updated last year
- A collection of browser-based side channel attack vectors.☆746Updated 11 months ago
- Magic hashes – PHP hash "collisions"☆730Updated last month
- detect stegano-hidden data in PNG & BMP☆1,369Updated 11 months ago
- Connect like there is no firewall. Securely.☆1,626Updated this week
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,099Updated 3 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆378Updated 3 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,560Updated 2 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,521Updated 3 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,914Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆786Updated 2 years ago
- A tool for IDN homograph attacks and detection.☆731Updated 4 years ago
- documentations, slides decks...☆790Updated 9 months ago