derbenoo / otp_pwn
Utility for exploiting the one-time pad (OTP) key reuse vulnerability.
☆29Updated 7 years ago
Alternatives and similar repositories for otp_pwn:
Users that are interested in otp_pwn are comparing it to the libraries listed below
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- ☆27Updated 2 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- ☆26Updated 3 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆58Updated last year
- Upcoming list of ctfs directly in your terminal!☆16Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆67Updated 3 years ago
- A tool for finding the one gadget RCE in libc☆75Updated 4 years ago
- CTFd Dump - When you want to have an offline copy of a CTF.☆47Updated 8 months ago
- ☆45Updated last year
- Very simple script(s) to hasten binary exploit creation☆92Updated 3 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Cross-architecture instruction counting for CTF solving☆46Updated 3 years ago
- CTF write-ups☆82Updated 4 months ago
- FAUST Gameserver for attack-defense CTFs☆72Updated 3 months ago
- All challenges I created for CTF☆12Updated 3 years ago
- ☆25Updated 4 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- a repo of links to useful writeups of pwn challenges☆26Updated 6 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- justCTF 2019 challenges sources☆37Updated 3 years ago
- Pwn2Win 2020 Challenges☆55Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆61Updated 3 years ago
- ☆20Updated 3 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago