nccgroup / featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
☆1,099Updated 3 years ago
Alternatives and similar repositories for featherduster:
Users that are interested in featherduster are comparing it to the libraries listed below
- A tool to analyze multi-byte xor cipher☆1,415Updated last year
- A colleciton of CTF write-ups all using pwntools☆508Updated 8 years ago
- CTF write-ups by Plaid Parliament of Pwning☆776Updated 8 months ago
- A set of security related tools☆660Updated 3 years ago
- CTF write-ups from the VulnHub CTF Team☆697Updated 6 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,907Updated 3 months ago
- CTF Field Guide☆1,324Updated 3 months ago
- Script for searching the extracted firmware file system for goodies!☆1,096Updated last year
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,125Updated last year
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆230Updated this week
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,751Updated 5 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆1,988Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆678Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,610Updated 6 years ago
- The iCTF Framework, presented by Shellphish!☆333Updated 2 years ago
- A Course on Intermediate Level Linux Exploitation☆992Updated 4 years ago
- Build a database of libc offsets to simplify exploitation☆1,740Updated 3 months ago
- detect stegano-hidden data in PNG & BMP☆1,361Updated 10 months ago
- The best tool for finding one gadget RCE in libc.so.6☆2,123Updated this week
- A pure-python fully automated and unattended fuzzing framework.☆1,428Updated 4 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆426Updated last year
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆641Updated this week
- Simplify format string exploitation.☆339Updated 3 years ago
- Automated script for performing Padding Oracle attacks☆764Updated 7 months ago
- A fork and successor of the Sulley Fuzzing Framework☆2,078Updated last week
- A shellcode writing toolkit☆661Updated 2 years ago
- My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.☆536Updated 6 months ago
- Tutorials for getting started with Pwntools☆1,436Updated 4 months ago
- Tips, Tricks, and Suggestions for Running a CTF☆381Updated 2 years ago
- ☆1,101Updated 2 weeks ago