corkami / mitraLinks
A generator of weird files (binary polyglots, near polyglots, polymocks...)
☆1,229Updated 8 months ago
Alternatives and similar repositories for mitra
Users that are interested in mitra are comparing it to the libraries listed below
Sorting:
- Katana - Automatic CTF Challenge Solver in Python3☆1,314Updated last year
- PwnAdventure3 Server☆649Updated 3 years ago
- Example pwnable challenge hosted with docker☆225Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆580Updated last month
- Proof of concept for pwnkit vulnerability☆347Updated 2 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,363Updated 7 months ago
- pwninit - automate starting binary exploit challenges☆973Updated last year
- a CTF web challenge about making screenshots☆225Updated 3 years ago
- documentations, slides decks...☆808Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆688Updated 11 months ago
- Many-Time Pad Interactive☆176Updated last year
- ☆1,118Updated 4 years ago
- Proof of Concepts (PE, PDF...)☆1,520Updated 8 months ago
- Hash identification program.☆154Updated 3 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- Material for the YouTube series☆508Updated 3 years ago
- CVE-2021-3156 - Sudo Baron Samedit☆220Updated 3 years ago
- redpwn's CTF platform☆274Updated 6 months ago
- A toy Feistel network implementation☆122Updated 5 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 5 months ago
- Magic hashes – PHP hash "collisions"☆785Updated 5 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,883Updated 2 years ago
- Perfect Blue's CTF Writeups☆684Updated last year
- Yet another Stego Tool☆389Updated 2 years ago
- Project HashClash - MD5 & SHA-1 cryptanalysis☆872Updated 3 months ago
- Some challenge solutions solved using z3☆222Updated 2 years ago
- ☆1,144Updated 7 months ago
- Steganalysis web platform☆672Updated last month
- The single instruction C compiler☆1,450Updated 3 years ago
- Trojan Source: Invisible Vulnerabilities☆1,265Updated 2 years ago