corkami / mitraLinks
A generator of weird files (binary polyglots, near polyglots, polymocks...)
☆1,225Updated 6 months ago
Alternatives and similar repositories for mitra
Users that are interested in mitra are comparing it to the libraries listed below
Sorting:
- Katana - Automatic CTF Challenge Solver in Python3☆1,307Updated last year
- Project HashClash - MD5 & SHA-1 cryptanalysis☆852Updated 2 months ago
- Yet another tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.☆615Updated 2 months ago
- Running Hashcat on Google Colab with session backup and restore.☆739Updated 3 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆568Updated last month
- Writeups of previous editions☆72Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,930Updated 2 years ago
- a CTF web challenge about making screenshots☆225Updated 3 years ago
- Example pwnable challenge hosted with docker☆224Updated last year
- PwnAdventure3 Server☆649Updated 3 years ago
- ☆1,117Updated 4 years ago
- Proof of Concepts (PE, PDF...)☆1,513Updated 6 months ago
- Magic hashes – PHP hash "collisions"☆778Updated 3 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,873Updated 2 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,142Updated last year
- ☆1,135Updated 5 months ago
- 🐧 Abuse of Google Colab for cracking hashes.☆950Updated 2 years ago
- documentations, slides decks...☆803Updated last year
- Fancy reverse and bind shell handler☆2,773Updated 11 months ago
- Many-Time Pad Interactive☆174Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,356Updated 5 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- Hash identification program.☆153Updated 3 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,584Updated 8 months ago
- Proof of concept for pwnkit vulnerability☆346Updated 2 years ago
- A tool to analyze multi-byte xor cipher☆1,437Updated last month
- The xx file format. Turn your hex dumps into art, then into binary data.☆344Updated 2 years ago
- Hash collisions and exploitations☆3,228Updated 4 months ago
- Yet another Stego Tool☆387Updated 2 years ago
- redpwn's CTF platform☆273Updated 5 months ago