nccgroup / featherdusterLinks
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
☆1,108Updated 3 years ago
Alternatives and similar repositories for featherduster
Users that are interested in featherduster are comparing it to the libraries listed below
Sorting:
- A colleciton of CTF write-ups all using pwntools☆513Updated 8 years ago
- A tool to analyze multi-byte xor cipher☆1,436Updated last week
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,972Updated 3 months ago
- CTF write-ups by Plaid Parliament of Pwning☆786Updated 11 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,129Updated last year
- A Course on Intermediate Level Linux Exploitation☆1,003Updated 4 years ago
- detect stegano-hidden data in PNG & BMP☆1,415Updated last year
- A set of security related tools☆665Updated 4 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,175Updated this week
- Build a database of libc offsets to simplify exploitation☆1,785Updated 7 months ago
- CTF write-ups from the VulnHub CTF Team☆701Updated 7 years ago
- CTF Field Guide☆1,351Updated 6 months ago
- The Damn Vulnerable Router Firmware Project☆688Updated 4 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,778Updated 5 years ago
- Script for searching the extracted firmware file system for goodies!☆1,128Updated last year
- Interactive shellcoding environment to easily craft shellcodes☆895Updated 4 years ago
- Ctf solutions from p4 team☆1,810Updated 8 months ago
- Tutorials for getting started with Pwntools☆1,470Updated 8 months ago
- Security, hacking conferences (list)☆524Updated 3 weeks ago
- ☆280Updated 5 years ago
- An archive of low-level CTF challenges developed over the years☆633Updated 3 years ago
- ☆676Updated 2 months ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- Steganography brute-force utility to uncover hidden data inside files☆572Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,554Updated 3 years ago
- Security CTF Toolkit (Not maintained anymore)☆370Updated 7 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,202Updated 4 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,616Updated 6 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆234Updated 2 months ago