iagox86 / hash_extender
☆1,105Updated last month
Alternatives and similar repositories for hash_extender:
Users that are interested in hash_extender are comparing it to the libraries listed below
- detect stegano-hidden data in PNG & BMP☆1,369Updated 11 months ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,099Updated 3 years ago
- Build a database of libc offsets to simplify exploitation☆1,742Updated 4 months ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,753Updated 5 years ago
- A tool to analyze multi-byte xor cipher☆1,422Updated last year
- Magic hashes – PHP hash "collisions"☆730Updated last month
- The best tool for finding one gadget RCE in libc.so.6☆2,129Updated this week
- attacking RSA via lattice reductions (LLL)☆789Updated 3 years ago
- Automated script for performing Padding Oracle attacks☆765Updated 7 months ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,918Updated this week
- Tutorials for getting started with Pwntools☆1,438Updated 5 months ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆319Updated 2 years ago
- A colleciton of CTF write-ups all using pwntools☆508Updated 8 years ago
- My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.☆540Updated 6 months ago
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,719Updated 7 months ago
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,290Updated last month
- ☆1,138Updated 7 years ago
- CTF write-ups by Plaid Parliament of Pwning☆778Updated 8 months ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,054Updated last month
- Project HashClash - MD5 & SHA-1 cryptanalysis☆807Updated last month
- Perfect Blue's CTF Writeups☆673Updated 8 months ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆514Updated last year
- Pure Python hash length extension module☆123Updated 2 years ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,522Updated 3 years ago
- Predict python's random module generated values.☆393Updated 3 months ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆993Updated 3 years ago
- gdb for pwn☆908Updated 6 months ago
- A set of security related tools☆662Updated 3 years ago
- pwninit - automate starting binary exploit challenges☆915Updated 6 months ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆171Updated 4 years ago