ignis-sec / CtfCryptoTool
A tool for automated analysis of ctf type crypto challenges
☆29Updated 5 years ago
Alternatives and similar repositories for CtfCryptoTool:
Users that are interested in CtfCryptoTool are comparing it to the libraries listed below
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆23Updated 6 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 5 months ago
- A mirror of several precompiled standalone red-teaming tools.☆19Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Reverse Shell as a Service☆32Updated 4 years ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- Jar2Exe extraction tool☆14Updated 2 years ago
- A tool for creating proxy dll for hijacking☆42Updated 6 months ago
- Our team's CTF writeups☆10Updated 5 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- ☆44Updated 3 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- ☆51Updated 2 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆61Updated 4 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆57Updated last year
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- Anti-reverse Compilation☆33Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Scripts I used during CTP☆67Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Detailed writeups of how I solved infosec Capture The Flag (CTF) challenges☆48Updated 4 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago