ignis-sec / CtfCryptoToolLinks
A tool for automated analysis of ctf type crypto challenges
☆29Updated 5 years ago
Alternatives and similar repositories for CtfCryptoTool
Users that are interested in CtfCryptoTool are comparing it to the libraries listed below
Sorting:
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24Updated 7 years ago
- Basic Dart reverse shell code☆21Updated last year
- Reverse Shell as a Service☆32Updated 4 years ago
- ☆44Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- ☆50Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- A Pwning Toolkit☆28Updated 5 months ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 6 months ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- A tool for creating proxy dll for hijacking☆42Updated 7 months ago
- offensive notes & resources☆43Updated 2 months ago
- Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.☆20Updated 4 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- ☆36Updated 6 years ago
- Our team's CTF writeups☆10Updated 5 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆18Updated 6 years ago
- Collection of things made during my preparation to take on OSEE☆98Updated 5 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆94Updated 3 years ago
- Just some Rust process injector POCs, nothing weird.☆80Updated 3 years ago