mklarz / cipher_identifierLinks
WIP of a script that tries to identify symbol ciphers (for now) available on dcode.fr based on input.
☆16Updated 2 years ago
Alternatives and similar repositories for cipher_identifier
Users that are interested in cipher_identifier are comparing it to the libraries listed below
Sorting:
- A Pwning Toolkit☆28Updated 9 months ago
- Where CTFs happen☆81Updated last year
- redpwn's challenge deployment system☆28Updated last year
- CVE-2021-3156: Sudo heap overflow exploit for Debian 10☆50Updated 3 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- CTF writeups☆17Updated 2 months ago
- ☆64Updated last year
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- ☆25Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆144Updated 4 years ago
- A happy heap editor to support your exploitation process☆197Updated 4 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆49Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆72Updated 4 years ago
- ✍️ A curated list of CVE PoCs.☆12Updated 7 years ago
- ☆14Updated 5 years ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆226Updated 4 years ago
- Security Research☆39Updated 3 years ago
- ☆82Updated 7 years ago
- Linux kernel exploits for local privilege escalation☆80Updated 7 years ago
- GPU-accelerated ascii art generator with subpixel rendering☆18Updated 4 years ago
- Binary Golf Library☆62Updated 4 years ago
- Short writeups/solvers for interesting CTF challenges.☆17Updated 2 years ago
- ☆45Updated last month
- Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.☆41Updated 3 years ago
- Binary Golf Grand Prix☆113Updated last year
- Open repository of binary sample collections for binary analysis.☆17Updated 4 years ago
- Automatic ROPChain Generation☆292Updated 5 years ago