hyprwired / untwisterLinks
Seed recovery tool for PRNGs
☆41Updated 9 years ago
Alternatives and similar repositories for untwister
Users that are interested in untwister are comparing it to the libraries listed below
Sorting:
- ☆10Updated 10 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- ☆101Updated 4 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- intentionally vulnerable API☆30Updated last year
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- A simple tool to manipulate window objects in Windows☆45Updated 8 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆118Updated 4 years ago
- TLS Redirection☆120Updated 8 years ago
- Tasks from CTFZone 2017 quals☆12Updated 8 years ago
- The Guppy Proxy (GUI Pappy)☆142Updated 6 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- ☆35Updated 13 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆64Updated 2 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- A simple tool to convert the IP to a DWORD IP☆140Updated 3 years ago
- .NET Deserialization Passive Scanner☆46Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- ☆32Updated 10 years ago