jaybosamiya / CryptoGuyLinks
CryptoGuy is a tool usefull to find out various decryptions of a string
☆25Updated 10 years ago
Alternatives and similar repositories for CryptoGuy
Users that are interested in CryptoGuy are comparing it to the libraries listed below
Sorting:
- ☆19Updated 9 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- ☆16Updated 7 years ago
- Experiments in trying to find 0-days in numpy☆38Updated 8 years ago
- ☆21Updated 3 years ago
- CSAW CTF 2016 Finals☆13Updated 9 years ago
- Exploit web-vulnerabilities☆23Updated 6 years ago
- Security Tool to detect arp poisoning attacks☆54Updated 7 years ago
- Demonstrating a practical attack on the Diffie Hellman Key Exchange protocol, through breaking a secure chat system☆14Updated 10 years ago
- Writeups for different CTF challenges☆70Updated 8 months ago
- My presentations from different conferences☆15Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- quals-2014☆21Updated 11 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 10 years ago
- ☆15Updated 7 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 9 years ago
- Write ups☆16Updated 8 years ago
- Writeups and solutions for RC3CTF 2016☆14Updated 9 years ago
- GryphonCTF 2016 Challenges Repository.☆17Updated 8 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Updated 10 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆68Updated 8 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 11 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago