keyunluo / pkcrackLinks
pkcrack with modern building tools
☆195Updated 3 years ago
Alternatives and similar repositories for pkcrack
Users that are interested in pkcrack are comparing it to the libraries listed below
Sorting:
- PCRT (PNG Check & Repair Tool), a tool to help check and fix the error in a PNG image.☆248Updated 3 years ago
- Predict python's random module generated values.☆419Updated 9 months ago
- Yet another Stego Tool☆389Updated 2 years ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆109Updated 4 years ago
- A collection of statically compiled tools like Nmap and Socat.☆454Updated last year
- A web-based, accessible and open-source port of StegSolve.☆349Updated last year
- ☆1,144Updated 7 months ago
- Decode All Bases - Base Scheme Decoder☆565Updated 2 years ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆454Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆153Updated 3 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆330Updated 2 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆190Updated 4 years ago
- Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.☆575Updated 8 months ago
- Project HashClash - MD5 & SHA-1 cryptanalysis☆872Updated 3 months ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- A tool to analyze multi-byte xor cipher☆1,447Updated 3 months ago
- Magic hashes – PHP hash "collisions"☆785Updated 5 months ago
- Padding oracle attack against PKCS7☆335Updated 2 years ago
- detect stegano-hidden data in PNG & BMP☆1,459Updated 3 weeks ago
- TCP flow analyzer with sugar for A/D CTF☆143Updated 2 years ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆332Updated 3 years ago
- pwninit - automate starting binary exploit challenges☆973Updated last year
- Deriving RSA public keys from message-signature pairs☆338Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆320Updated 2 years ago
- Pure Python hash length extension module☆126Updated 2 years ago
- A Python3 implementation of the Wiener attack on RSA☆122Updated last year
- Linux PAM Backdoor☆347Updated last year
- Various kernel exploits☆790Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,019Updated 4 years ago
- Perfect Blue's CTF Writeups☆684Updated last year