nccgroup / featherdusterLinks
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
☆1,110Updated 3 years ago
Alternatives and similar repositories for featherduster
Users that are interested in featherduster are comparing it to the libraries listed below
Sorting:
- Script for searching the extracted firmware file system for goodies!☆1,132Updated last year
- A tool to analyze multi-byte xor cipher☆1,436Updated last month
- A colleciton of CTF write-ups all using pwntools☆513Updated 8 years ago
- A set of security related tools☆664Updated 4 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,133Updated last year
- The Damn Vulnerable Router Firmware Project☆691Updated 4 years ago
- CTF write-ups by Plaid Parliament of Pwning☆785Updated last year
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆841Updated 4 months ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,976Updated 3 months ago
- CTF Field Guide☆1,356Updated 7 months ago
- Attify OS - Distro for pentesting IoT devices☆991Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,616Updated 6 years ago
- detect stegano-hidden data in PNG & BMP☆1,422Updated last year
- ☆1,126Updated 4 months ago
- A Course on Intermediate Level Linux Exploitation☆1,002Updated 4 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,780Updated 6 years ago
- Post Exploitation Collection☆1,562Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- kernel privilege escalation enumeration and exploitation framework☆691Updated 6 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,184Updated this week
- A tool to help you write binary exploits☆610Updated 6 years ago
- Build a database of libc offsets to simplify exploitation☆1,790Updated 7 months ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆235Updated 3 months ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,939Updated 11 months ago
- The iCTF Framework, presented by Shellphish!☆334Updated 2 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- CTF write-ups from the VulnHub CTF Team☆701Updated 7 years ago
- Linux Exploit Suggester; based on operating system release number☆1,795Updated 11 years ago
- Interactive shellcoding environment to easily craft shellcodes☆895Updated 4 years ago