jaybosamiya / CryptoGuyLinks
CryptoGuy is a tool usefull to find out various decryptions of a string
☆25Updated 10 years ago
Alternatives and similar repositories for CryptoGuy
Users that are interested in CryptoGuy are comparing it to the libraries listed below
Sorting:
- ☆19Updated 9 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Experiments in trying to find 0-days in numpy☆38Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 9 years ago
- Exploit web-vulnerabilities☆23Updated 6 years ago
- Security Tool to detect arp poisoning attacks☆55Updated 7 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- ☆16Updated 7 years ago
- ☆15Updated 7 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 10 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 11 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- CSAW CTF 2016 Finals☆13Updated 8 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- ☆26Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Vulnerability research and development.☆25Updated 10 years ago
- ☆15Updated 5 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 9 years ago
- The educational Animus malware☆18Updated 6 years ago
- ☆25Updated 9 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- ☆45Updated 7 years ago
- Demonstrating a practical attack on the Diffie Hellman Key Exchange protocol, through breaking a secure chat system☆14Updated 9 years ago
- My presentations from different conferences☆15Updated 7 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 9 years ago