cr-marcstevens / hashclash
Project HashClash - MD5 & SHA-1 cryptanalysis
☆803Updated last month
Alternatives and similar repositories for hashclash:
Users that are interested in hashclash are comparing it to the libraries listed below
- Hash collisions and exploitations☆3,145Updated this week
- Build a database of libc offsets to simplify exploitation☆1,742Updated 4 months ago
- The best tool for finding one gadget RCE in libc.so.6☆2,125Updated this week
- attacking RSA via lattice reductions (LLL)☆787Updated 3 years ago
- Predict python's random module generated values.☆391Updated 2 months ago
- detect stegano-hidden data in PNG & BMP☆1,363Updated 10 months ago
- A tool to analyze multi-byte xor cipher☆1,417Updated last year
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆172Updated 4 years ago
- Provide powerful tools for seccomp analysis☆1,011Updated this week
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- ☆1,102Updated 3 weeks ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,098Updated 3 years ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆319Updated 2 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,911Updated 3 months ago
- Many-Time Pad Interactive☆164Updated last year
- Build two PDFs that have different content but identical SHA1 sums.☆423Updated 3 weeks ago
- Perfect Blue's CTF Writeups☆673Updated 7 months ago
- gdb for pwn☆906Updated 6 months ago
- pwninit - automate starting binary exploit challenges☆912Updated 6 months ago
- QR Code Analysis and Recovery Toolkit☆412Updated last year
- pkcrack with modern building tools☆188Updated 3 years ago
- A docker environment for pwn in ctf☆753Updated last year
- Pure Python hash length extension module☆123Updated 2 years ago
- Seed recovery tool for PRNGs☆377Updated 6 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,751Updated 5 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,125Updated last year
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆677Updated 5 months ago
- Factoring as a Service☆263Updated 2 years ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆415Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆127Updated 11 months ago