cryptcoffee / skul
Skul is a PoC to bruteforce the Cryptsetup implementation of Linux Unified Key Setup (LUKS).
☆14Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for skul
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- Firmware analysis website + API☆42Updated 4 years ago
- hax 'n shit☆118Updated 9 years ago
- A GUI-based USB device fuzzer☆60Updated 7 years ago
- Memory inspection REPL interface☆46Updated 7 years ago
- A multi-codec media fuzzing tool.☆42Updated 12 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Network based protocol fuzzer☆68Updated 2 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆24Updated 9 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆86Updated 3 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆48Updated 9 months ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆51Updated 7 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 6 years ago
- various CTF writeups☆60Updated 6 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 5 years ago
- Created by David Maloney via the GitHub Connector☆12Updated last year
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- A pip wrapper around AFL.☆84Updated 3 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- CapFuzz - capture, fuzz & intercept web traffic.☆63Updated 5 years ago
- Automated Exploit generation with WinDBG☆188Updated 8 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆45Updated 2 years ago
- An example rootkit that gives a userland process root permissions