jaybosamiya / matasano-crypto
Cracking real-world Crypto, the fun way
☆19Updated 8 years ago
Alternatives and similar repositories for matasano-crypto
Users that are interested in matasano-crypto are comparing it to the libraries listed below
Sorting:
- Experiments in trying to find 0-days in numpy☆38Updated 7 years ago
- Writeups for different CTF challenges☆69Updated last month
- ☆21Updated 3 years ago
- ☆19Updated 9 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆68Updated 7 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆167Updated 7 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 10 years ago
- Demonstrating a practical attack on the Diffie Hellman Key Exchange protocol, through breaking a secure chat system☆14Updated 9 years ago
- Tools of the trade☆84Updated 2 years ago
- Security Tool to detect arp poisoning attacks☆55Updated 7 years ago
- Exploit web-vulnerabilities☆23Updated 6 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆141Updated 6 years ago
- Tool to test different CTF scoring algorithms on real data☆17Updated 4 years ago
- ☆16Updated 6 years ago
- Recent Fuzzing Paper☆35Updated last year
- ☆82Updated 7 years ago
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- ☆22Updated 5 years ago
- Hide information content into busy areas of images, optimally☆63Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Some security related notes☆458Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆147Updated 5 years ago
- Evolutionary Fuzzer written in Rust☆23Updated 7 years ago
- ☆49Updated 8 years ago
- A toy implementation of 'Stack Guard' on top of the LLVM compiler toolchain☆24Updated 7 years ago
- ☆9Updated 9 years ago
- A small implementation of blockchain protocol.☆13Updated 7 years ago
- ☆9Updated last year
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 9 years ago