nneonneo / sha1colliderLinks
Build two PDFs that have different content but identical SHA1 sums.
☆438Updated 4 months ago
Alternatives and similar repositories for sha1collider
Users that are interested in sha1collider are comparing it to the libraries listed below
Sorting:
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- A tool for predicting the output of random number generators☆193Updated 8 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,110Updated 3 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 4 years ago
- Working with numbers (primes, modular, etc.)☆243Updated 2 years ago
- Seed recovery tool for PRNGs☆380Updated 6 years ago
- Simplify format string exploitation.☆339Updated 3 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- CTF write-ups by Plaid Parliament of Pwning☆785Updated last year
- A work-in-progress deobfuscator for movfuscated binaries☆730Updated last month
- CTF framework and exploit development library in python3 (pwntools and binjitsu fork)☆282Updated 5 years ago
- Factoring as a Service☆265Updated 3 years ago
- How to backdoor Diffie-Hellman☆612Updated 8 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- Extended Differential Fuzzing Framework☆323Updated 7 years ago
- PoC for Dirty COW (CVE-2016-5195)☆500Updated 3 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆412Updated 6 years ago
- Project HashClash - MD5 & SHA-1 cryptanalysis☆847Updated last month
- chw00t - Unices chroot breaking tool☆593Updated 6 years ago
- A portable, padding oracle exploit API☆326Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆691Updated 6 years ago
- ☆269Updated 2 years ago
- CTF Writeups☆186Updated 7 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆656Updated last year
- Using Intel's PIN tool to solve CTF problems☆501Updated 5 years ago
- binary patching from Python☆637Updated last year
- Wiki-like CTF write-ups repository, maintained by the community. 2018☆270Updated 6 years ago
- ☆1,128Updated 4 months ago
- My proof-of-concept exploits for the Linux kernel☆1,472Updated 3 years ago
- Detection script for the ROBOT vulnerability☆272Updated 2 years ago