corkami / mitraLinks
A generator of weird files (binary polyglots, near polyglots, polymocks...)
☆1,219Updated 5 months ago
Alternatives and similar repositories for mitra
Users that are interested in mitra are comparing it to the libraries listed below
Sorting:
- Katana - Automatic CTF Challenge Solver in Python3☆1,303Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,866Updated 2 years ago
- 🐧 Abuse of Google Colab for cracking hashes.☆948Updated last year
- A set of security related tools☆665Updated 4 years ago
- Magic hashes – PHP hash "collisions"☆770Updated 2 months ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,131Updated last year
- Example pwnable challenge hosted with docker☆223Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,108Updated 3 years ago
- Yet another tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.☆612Updated last month
- Predict python's random module generated values.☆410Updated 6 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,351Updated 4 months ago
- PwnAdventure3 Server☆648Updated 3 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆563Updated 2 weeks ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,318Updated 5 months ago
- A collection of pwn/CTF related utilities for Ghidra☆680Updated 8 months ago
- Seed recovery tool for PRNGs☆380Updated 6 years ago
- ☆616Updated 5 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,355Updated 3 months ago
- Collection of steganography tools - helps with CTF challenges☆2,524Updated 2 years ago
- pwninit - automate starting binary exploit challenges☆941Updated 9 months ago
- ☆2,743Updated 10 months ago
- Monitor linux processes without root permissions☆5,460Updated 2 years ago
- Perfect Blue's CTF Writeups☆678Updated 11 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,539Updated 3 years ago
- Proof of Concepts (PE, PDF...)☆1,502Updated 5 months ago
- ☆1,124Updated 4 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,083Updated 10 months ago
- Running Hashcat on Google Colab with session backup and restore.☆737Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,563Updated 3 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,924Updated 2 years ago