Docker image for attacking cryptography CTF challenges
☆111Apr 29, 2024Updated last year
Alternatives and similar repositories for cryptohack-docker
Users that are interested in cryptohack-docker are comparing it to the libraries listed below
Sorting:
- A community driven resource for learning CryptoGraphy☆70Apr 19, 2023Updated 2 years ago
- ☆26Apr 23, 2021Updated 4 years ago
- A Dark theme for VS Code☆13Apr 1, 2021Updated 4 years ago
- Typora theme based on the CryptoHack blog☆33Mar 24, 2021Updated 4 years ago
- Repository to place any and all scripts made to solve CTF challenges. Why solve what's already been solved?☆13Nov 12, 2023Updated 2 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆131Jun 18, 2025Updated 8 months ago
- ☆17Mar 8, 2016Updated 9 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 10 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆143Mar 13, 2024Updated last year
- Python implementations of cryptographic attacks and utilities.☆1,233Jan 8, 2026Updated last month
- This is an IDA plugin to recover class information from C++ binary.☆19Aug 4, 2020Updated 5 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆251Jul 6, 2023Updated 2 years ago
- attacking RSA via lattice reductions (LLL)☆831Apr 11, 2021Updated 4 years ago
- CVP "trick" for CTF challenges☆150Jun 19, 2023Updated 2 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆141Jun 28, 2022Updated 3 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- A happy heap editor to support your exploitation process☆198May 6, 2021Updated 4 years ago
- A repository trying to collect things related to LLL☆73Sep 10, 2024Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆591Feb 11, 2026Updated 2 weeks ago
- Coppersmith's method for multivariate polynomials☆193Oct 11, 2023Updated 2 years ago
- Writeup of CVE-2020-15906☆49Oct 26, 2020Updated 5 years ago
- 本文原文由知名 Hacker Eric S. Raymond 所撰寫,教你如何正確的提出技術問題並獲得你滿意的答案。☆13Sep 25, 2020Updated 5 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Power-calibrate calibrates the power consumption of a mobile device that has a battery power source. It will attempt to calculate the pow…☆12Jan 1, 2025Updated last year
- ☆29Nov 14, 2022Updated 3 years ago
- Python library for CTFer☆174Feb 11, 2026Updated 2 weeks ago
- Clone of the original project https://sourceforge.net/projects/sqsh/☆14Dec 8, 2023Updated 2 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆115Apr 20, 2021Updated 4 years ago
- ☆11Nov 21, 2020Updated 5 years ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago