mklarz / cipher_identifier
WIP of a script that tries to identify symbol ciphers (for now) available on dcode.fr based on input.
☆16Updated last year
Alternatives and similar repositories for cipher_identifier:
Users that are interested in cipher_identifier are comparing it to the libraries listed below
- Set of pre-generated pwn.college challenges☆64Updated 2 years ago
- ☆45Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆66Updated 3 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 3 years ago
- Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.☆39Updated 2 years ago
- Pwn2Win 2020 Challenges☆55Updated 3 years ago
- Discord bot focused on managing and organising CTFs / Security stuff☆17Updated 2 months ago
- If I solve a CTF challenge and do a writeup, it goes here.☆10Updated 2 months ago
- ☆14Updated 4 years ago
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆125Updated 2 years ago
- ☆47Updated 9 months ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆139Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 4 years ago
- CTF writeups☆17Updated 4 months ago
- CVE-2021-3156: Sudo heap overflow exploit for Debian 10☆51Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- A Pwning Toolkit☆28Updated last month
- Very simple script(s) to hasten binary exploit creation☆92Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆59Updated 4 years ago
- Where CTFs happen☆81Updated 8 months ago
- Cross-architecture instruction counting for CTF solving☆46Updated 2 years ago
- ☆13Updated 4 years ago
- Anti-reverse Compilation☆32Updated 3 years ago
- A happy heap editor to support your exploitation process☆195Updated 3 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆23Updated 6 years ago
- Exploit for CVE-2021-27342 vulnerability (telnet authentication brute-force protection bypass)☆13Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- ☆48Updated 4 years ago