kudelskisecurity / cryptochallenge18View external linksLinks
Kudelski Security's 2018 pre-Black Hat crypto challenge
☆36Aug 27, 2018Updated 7 years ago
Alternatives and similar repositories for cryptochallenge18
Users that are interested in cryptochallenge18 are comparing it to the libraries listed below
Sorting:
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- ☆15May 23, 2019Updated 6 years ago
- TV show scraper/renamer thingy☆12May 10, 2013Updated 12 years ago
- ☆28Jun 28, 2019Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- ☆25Dec 4, 2022Updated 3 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Debian live build for the Pocket-Kali☆41May 16, 2018Updated 7 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆23Nov 16, 2020Updated 5 years ago
- Writeups for past CTFs I've joined☆18Jun 1, 2021Updated 4 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆90Feb 14, 2019Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Aug 5, 2013Updated 12 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆94Oct 19, 2020Updated 5 years ago
- A TypeScript penumbra SDK☆18Aug 4, 2022Updated 3 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Mar 21, 2018Updated 7 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Jan 8, 2019Updated 7 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- CoSi command line interface☆21Jan 23, 2017Updated 9 years ago
- ☆23Nov 18, 2015Updated 10 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Sep 14, 2021Updated 4 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Code samples that correctly check the remote server's SSL certificate☆24Feb 22, 2016Updated 9 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- A NodeMCU based wifi scanner that logs SSIDs to a text file on a sd card.☆21Oct 1, 2018Updated 7 years ago
- Security advisories by SBA Research.☆25Jan 7, 2026Updated last month
- Google Cloud Platform Security Tool☆235Jul 30, 2019Updated 6 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 8 years ago