β46Jul 30, 2023Updated 2 years ago
Alternatives and similar repositories for AES-CTF-Tool
Users that are interested in AES-CTF-Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β10Nov 21, 2024Updated last year
- πA convenient glibc binary and debug file downloader and source code auto builderβ30Feb 12, 2026Updated last month
- A stacked docker environment for solving CTF PWN challenges.β10Dec 4, 2021Updated 4 years ago
- the rounding error tool π©β14May 16, 2025Updated 10 months ago
- A Binary Ninja plugin providing a set of BinaryViews for loading Motorola SREC, Intel HEX, and TI-TXT "hex" filesβ10Sep 5, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Uni Work - labs, exams, homework.β13Mar 18, 2021Updated 5 years ago
- PoC for House of Husk Exploitβ13Apr 3, 2020Updated 5 years ago
- A tool to inject C code into ELF64 binariesβ29May 25, 2021Updated 4 years ago
- NetCat implementation using the new Apple Network framework, C# port of the C sampleβ12Aug 27, 2018Updated 7 years ago
- Allows you to use randomly assigned hostports in Kubernetes podsβ16Aug 10, 2020Updated 5 years ago
- An online repo with different tools I have built or scripts that helped me in CTF competitions.β17Feb 28, 2022Updated 4 years ago
- Automated Firebase security scanner to check for unauthorized read and write access on firestore, realtime databases, storage buckets andβ¦β43Oct 4, 2025Updated 5 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELROβ22May 26, 2022Updated 3 years ago
- Egui DirectX9, DirectX10, DirectX11 Renderers and Win32 Input Handlerβ15Jun 19, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- β12Jul 4, 2024Updated last year
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.β14Updated this week
- MessageBox files (EXE, DLL) for testing purposes.β13Mar 9, 2019Updated 7 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruderβ20Mar 26, 2022Updated 4 years ago
- β35May 26, 2023Updated 2 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023β13Nov 17, 2023Updated 2 years ago
- Python implementations of cryptographic attacks and utilities.β1,243Jan 8, 2026Updated 2 months ago
- An open-source SBox analysis utilityβ19Mar 25, 2025Updated last year
- Command generator for pentesting toolsβ17Dec 2, 2024Updated last year
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A rust and SageMath implementation of (2,2)-isogenies in the theta modelβ25Jan 15, 2025Updated last year
- Open source card gameβ19Jan 9, 2016Updated 10 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDHβ139Apr 17, 2023Updated 2 years ago
- A Socket.IO middleware for authenticating with a JSON Web Token based on passport-jwt.β10Jul 19, 2017Updated 8 years ago
- DLL injector written in Rustβ16Feb 7, 2022Updated 4 years ago
- β12Nov 12, 2022Updated 3 years ago
- β67Nov 10, 2025Updated 4 months ago
- β16Oct 13, 2024Updated last year
- β16Jun 9, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- IrisCTF 2023 challenges.β16Jan 23, 2023Updated 3 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clientsβ17Jun 4, 2018Updated 7 years ago
- Quixotic Color Scheme for Terminal Emulatorsβ13Dec 10, 2022Updated 3 years ago
- a new class of file structure attacksβ60Nov 19, 2022Updated 3 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.β40Nov 17, 2024Updated last year
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.β22Jan 8, 2017Updated 9 years ago
- Cookies, passwords, tokens, ip grabber.β15Aug 17, 2021Updated 4 years ago