deadPix3l / pyDHE
a fully python Diffie-Hellman Library
☆51Updated 6 years ago
Alternatives and similar repositories for pyDHE:
Users that are interested in pyDHE are comparing it to the libraries listed below
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- try privilege escalation changing sudo command☆119Updated 6 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- A shellcode testing harness.☆69Updated 7 months ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 11 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- WhiteBox CMS analysis☆69Updated last year
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- ☆21Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 9 years ago
- Files from Zeronights presentation.☆28Updated 12 years ago
- public exploits☆35Updated last year
- Published vulnerabilities and exploits.☆55Updated last year
- ☆74Updated 2 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆63Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- linux rootkit☆157Updated 7 years ago