nneonneo / sha1colliderView external linksLinks
Build two PDFs that have different content but identical SHA1 sums.
☆443Jan 31, 2025Updated last year
Alternatives and similar repositories for sha1collider
Users that are interested in sha1collider are comparing it to the libraries listed below
Sorting:
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- ☆11May 19, 2017Updated 8 years ago
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 8 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,609Jun 11, 2025Updated 8 months ago
- Project HashClash - MD5 & SHA-1 cryptanalysis☆912May 7, 2025Updated 9 months ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 8 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- Working with numbers (primes, modular, etc.)☆246Jul 15, 2022Updated 3 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆507May 11, 2021Updated 4 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- CTF writeups from Balsn☆473Mar 18, 2022Updated 3 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- My proof-of-concept exploits for the Linux kernel☆1,561Sep 11, 2025Updated 5 months ago
- ☆40Dec 29, 2017Updated 8 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- A repository for learning various heap exploitation techniques.☆8,430Jan 15, 2026Updated last month
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆104Jan 22, 2021Updated 5 years ago
- New TIOJ Judge Client☆15Jan 13, 2026Updated last month
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago
- ☆252Mar 13, 2020Updated 5 years ago
- gdb for pwn☆959Aug 29, 2025Updated 5 months ago
- Basic pwntools for Windows☆268Apr 22, 2023Updated 2 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,313Sep 3, 2019Updated 6 years ago
- Visualization of heap operations.☆617Dec 5, 2024Updated last year
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,631Oct 2, 2018Updated 7 years ago