nneonneo / sha1colliderLinks
Build two PDFs that have different content but identical SHA1 sums.
☆440Updated 10 months ago
Alternatives and similar repositories for sha1collider
Users that are interested in sha1collider are comparing it to the libraries listed below
Sorting:
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆201Updated 3 years ago
- Factoring as a Service☆273Updated 5 months ago
- Seed recovery tool for PRNGs☆386Updated 7 years ago
- CTF framework and exploit development library in python3 (pwntools and binjitsu fork)☆284Updated 5 years ago
- Working with numbers (primes, modular, etc.)☆246Updated 3 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆176Updated 5 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,115Updated 4 years ago
- A tool to help you write binary exploits☆606Updated 6 years ago
- A tool for predicting the output of random number generators☆194Updated 8 years ago
- Extended Differential Fuzzing Framework☆325Updated 7 years ago
- Files from my DEFCON CTF VM.☆273Updated 9 years ago
- ☆1,158Updated 10 months ago
- CTF Writeups☆190Updated 8 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆397Updated 3 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆419Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2013☆233Updated 9 years ago
- A colleciton of CTF write-ups all using pwntools☆519Updated 9 years ago
- Simplify format string exploitation.☆346Updated 4 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2018☆271Updated 7 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- Small python module for common CTF crypto functions☆165Updated 3 years ago
- A Pwn2Own exploit chain☆754Updated 7 years ago
- Security CTF Toolkit (Not maintained anymore)☆370Updated 7 years ago
- ☆281Updated 5 years ago
- chw00t - Unices chroot breaking tool☆609Updated 6 years ago
- generate and search pattern string for exploit development☆201Updated 10 months ago
- python module containing many classical cipher algorithms: Caesar, Vigenere, ADFGVX, Enigma etc.☆224Updated 4 years ago
- A portable, padding oracle exploit API☆330Updated 3 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆102Updated 8 years ago