naivenom / hash-collision-attack
A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functions have infinite input length and a predefined output length, there is inevitably going to be the possibility of two different inputs that produce the same output hash. If two separate inputs produce the same …
☆12Updated 7 years ago
Alternatives and similar repositories for hash-collision-attack:
Users that are interested in hash-collision-attack are comparing it to the libraries listed below
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 6 years ago
- Random Exploits☆50Updated last year
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12Updated last year
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆31Updated 6 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆11Updated 4 years ago
- Penetration testing with shellcode codes☆28Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- pwncat windows c2 components☆18Updated 3 years ago
- ☆24Updated 5 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Updated 4 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Some of my flag protected writeups☆11Updated 4 years ago
- Windows Privilege Escalation☆28Updated 4 years ago
- ☆19Updated 3 years ago
- Pentesting notes☆17Updated last year
- The following repo holds all scripts, apps, and documentation for InfoSec Red Team related activities.☆18Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- ☆24Updated 8 months ago
- Modern Binary Exploitation write-ups.☆4Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆36Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago
- Presentaciones de congresos☆51Updated 7 months ago
- Bash script to generate reverse shell payloads☆20Updated last year