corkami / mitra
A generator of weird files (binary polyglots, near polyglots, polymocks...)
☆1,213Updated 4 months ago
Alternatives and similar repositories for mitra:
Users that are interested in mitra are comparing it to the libraries listed below
- PwnAdventure3 Server☆645Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,544Updated last month
- documentations, slides decks...☆793Updated 11 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆788Updated 2 years ago
- Katana - Automatic CTF Challenge Solver in Python3☆1,298Updated last year
- The xx file format. Turn your hex dumps into art, then into binary data.☆339Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆673Updated 7 months ago
- The single instruction C compiler☆1,391Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,344Updated last month
- 🐧 Abuse of Google Colab for cracking hashes.☆946Updated last year
- Trojan Source: Invisible Vulnerabilities☆1,260Updated 2 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆548Updated this week
- Psychological warfare in reverse engineering☆998Updated 5 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆138Updated 6 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,298Updated 3 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,849Updated 2 years ago
- Proof of Concepts (PE, PDF...)☆1,500Updated 4 months ago
- Yet another tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.☆609Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,342Updated 2 months ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,392Updated 9 months ago
- a CTF web challenge about making screenshots☆225Updated 3 years ago
- pwninit - automate starting binary exploit challenges☆932Updated 8 months ago
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆455Updated 2 years ago
- Magic hashes – PHP hash "collisions"☆761Updated last month
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,114Updated last year
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,302Updated 2 months ago
- CVE-2021-3156 - Sudo Baron Samedit☆221Updated 3 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,921Updated 2 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,127Updated last year
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,570Updated last week