fta2012 / ReplicatedRandomLinks
☆121Updated 8 years ago
Alternatives and similar repositories for ReplicatedRandom
Users that are interested in ReplicatedRandom are comparing it to the libraries listed below
Sorting:
- Symbolic execution for the XorShift128+ algorithm.☆106Updated last month
- Seed recovery tool for PRNGs☆380Updated 6 years ago
- Seed recovery tool for PRNGs☆84Updated 9 years ago
- Recovers V8 Math.random seed from outputs, even when they are not consecutive.☆32Updated 9 years ago
- Maven central doesn't do SSL when serving you JARs. Dilettante is a MiTM proxy for exploiting that.☆160Updated 4 months ago
- Java Random sequence crackers materials☆12Updated 11 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- Write JavaScript alert(1) with Katakana characters only☆144Updated 7 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 8 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆174Updated 4 years ago
- A tool for predicting the output of random number generators☆193Updated 8 years ago
- Advanced buffer overflow and memory corruption security challenges☆188Updated 3 years ago
- Factoring as a Service☆265Updated 3 years ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu…☆81Updated 6 years ago
- PoC JavaScriopt AST deobfuscator based on partial evaluation.☆46Updated 10 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆124Updated 7 years ago
- A distributed fuzzing testing suite with web administration☆374Updated 6 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆161Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆179Updated 9 years ago
- Some kernel exploits☆144Updated 7 years ago
- ☆29Updated 5 years ago
- Generate two PDFs with different contents but identical SHA1 hashes.☆22Updated 8 years ago
- X41 Browser Security White Paper - Tools and PoCs☆183Updated 7 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆436Updated 4 months ago
- ☆77Updated 10 years ago
- VerSprite Security Research☆167Updated 2 years ago
- A tool to perform static analysis on regexes to determine whether they are vulnerable to ReDoS.☆110Updated 2 years ago
- ☆170Updated 4 years ago