corkami / mitra
A generator of weird files (binary polyglots, near polyglots, polymocks...)
☆1,133Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for mitra
- Katana - Automatic CTF Challenge Solver in Python3☆1,270Updated 8 months ago
- a CTF web challenge about making screenshots☆223Updated 3 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆523Updated 2 weeks ago
- ☆1,115Updated 3 years ago
- Example pwnable challenge hosted with docker☆215Updated 8 months ago
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,589Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,785Updated 2 years ago
- Collection of steganography tools - helps with CTF challenges☆2,399Updated last year
- PwnAdventure3 Server☆631Updated 3 years ago
- detect stegano-hidden data in PNG & BMP☆1,312Updated 7 months ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,030Updated last year
- pwninit - automate starting binary exploit challenges☆873Updated 2 months ago
- Perfect Blue's CTF Writeups☆667Updated 4 months ago
- Proof of concept for pwnkit vulnerability☆337Updated last year
- Yet another Stego Tool☆356Updated last year
- A set of security related tools☆649Updated 3 years ago
- Project HashClash - MD5 & SHA-1 cryptanalysis☆762Updated 2 months ago
- Fancy reverse and bind shell handler☆2,634Updated 3 months ago
- Steganalysis web platform☆526Updated last week
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,276Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,239Updated 4 months ago
- Reverse Shell as a Service☆1,850Updated 9 months ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆432Updated 2 years ago
- An aggregation of CTF challenges and write-ups for csictf 2020!☆52Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,317Updated 3 years ago
- redpwn's CTF platform☆266Updated 3 months ago
- Linux Binary Exploitation☆1,302Updated 3 years ago
- A tool to analyze multi-byte xor cipher☆1,394Updated last year
- Magic hashes – PHP hash "collisions"☆708Updated 7 months ago