eugenekolo / sec-tools
A set of security related tools
☆663Updated 4 years ago
Alternatives and similar repositories for sec-tools:
Users that are interested in sec-tools are comparing it to the libraries listed below
- detect stegano-hidden data in PNG & BMP☆1,397Updated last year
- A tool to analyze multi-byte xor cipher☆1,430Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,103Updated 3 years ago
- Collection of steganography tools - helps with CTF challenges☆2,493Updated 2 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,770Updated 5 years ago
- Tutorials for getting started with Pwntools☆1,456Updated 6 months ago
- CTF Field Guide☆1,339Updated 5 months ago
- Steganography brute-force utility to uncover hidden data inside files☆565Updated 4 years ago
- Everything needed for doing CTFs☆721Updated last year
- A colleciton of CTF write-ups all using pwntools☆511Updated 8 years ago
- Yet another Stego Tool☆377Updated last year
- CTF write-ups by Plaid Parliament of Pwning☆787Updated 10 months ago
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,322Updated 3 months ago
- My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.☆543Updated 2 weeks ago
- A sorted and updated list of security wargame sites.☆985Updated last week
- Katana - Automatic CTF Challenge Solver in Python3☆1,297Updated last year
- A Course on Intermediate Level Linux Exploitation☆999Updated 4 years ago
- CTF Cheatsheet☆73Updated 9 months ago
- ☆1,113Updated 2 months ago
- Challenges for Binary Exploitation Workshop☆605Updated 2 years ago
- Corelan Repository for mona.py☆1,739Updated 2 weeks ago
- Tips, Tricks, and Suggestions for Running a CTF☆385Updated 2 years ago
- Writeups for HacktheBox 'boot2root' machines☆1,950Updated last year
- The platform used to run picoCTF 2019. (deprecated)☆297Updated 11 months ago
- A general collection of information, tools, and tips regarding CTFs and similar security competitions☆1,776Updated 4 years ago
- Vulnerable server used for learning software exploitation☆1,031Updated 4 years ago
- Build a database of libc offsets to simplify exploitation☆1,766Updated 5 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,127Updated last year
- Writeups for infosec Capture the Flag events by team Galaxians☆426Updated last year
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,538Updated 3 years ago