naivenom / hash-collision-attackLinks
A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functions have infinite input length and a predefined output length, there is inevitably going to be the possibility of two different inputs that produce the same output hash. If two separate inputs produce the same …
☆15Updated 8 years ago
Alternatives and similar repositories for hash-collision-attack
Users that are interested in hash-collision-attack are comparing it to the libraries listed below
Sorting:
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- Random Exploits☆50Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Windows Privilege Escalation☆30Updated 5 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Updated 5 years ago
- Another Subdomain ENumeration Tool☆13Updated 3 years ago
- Unicode encoding attacks with machine learning☆98Updated 4 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 9 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆84Updated 4 years ago
- Pentest stuff☆50Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- ☆46Updated 4 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆98Updated 6 years ago
- Build interactive map of cameras from Shodan☆23Updated 6 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated last week
- CISCO CVE-2020-3452 Scanner & Exploiter☆100Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 7 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago
- ☆64Updated 3 years ago
- ☆28Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- A python library to automate time-based blind SQL injection☆49Updated 6 years ago
- XXE Injection Payloads☆28Updated 6 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Updated 3 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509☆58Updated 5 years ago
- Words list generator to crack security tokens☆111Updated 5 years ago
- NSE script to detect ProxyOracle☆13Updated 4 years ago