mklarz / cipher_identifierLinks
WIP of a script that tries to identify symbol ciphers (for now) available on dcode.fr based on input.
☆16Updated 2 years ago
Alternatives and similar repositories for cipher_identifier
Users that are interested in cipher_identifier are comparing it to the libraries listed below
Sorting:
- CVE-2021-3156: Sudo heap overflow exploit for Debian 10☆51Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- ☆24Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Exploit for CVE-2021-4034☆93Updated 4 years ago
- Where CTFs happen☆82Updated last year
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 3 years ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆99Updated 2 years ago
- A Pwning Toolkit☆28Updated last year
- Containing vulnerabilities I've discovered and maybe CVE☆20Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.☆42Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- ☆13Updated 7 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Updated 3 years ago
- CTF writeups☆18Updated last week
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Updated 3 years ago
- a reliable C based exploit and writeup for CVE-2021-3560.☆38Updated 4 years ago
- ☆38Updated 3 years ago
- A binary hardening system☆111Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- tools for shellcoding☆59Updated 2 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆114Updated 3 years ago
- ☆64Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Our team's CTF writeups☆12Updated 6 years ago
- CVE-2021-3707 , CVE-2021-3708☆21Updated 4 years ago
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago