nneonneo / sha1collider
Build two PDFs that have different content but identical SHA1 sums.
☆410Updated 3 years ago
Related projects: ⓘ
- ☆290Updated this week
- ☆994Updated this week
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆200Updated 2 years ago
- A tool to help you write binary exploits☆603Updated 5 years ago
- Files from my DEFCON CTF VM.☆267Updated 8 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆396Updated 5 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆179Updated 7 years ago
- Simplify format string exploitation.☆338Updated 2 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,084Updated 2 years ago
- A Pwn2Own exploit chain☆751Updated 5 years ago
- Factoring as a Service☆261Updated 2 years ago
- CTF framework and exploit development library in python3 (pwntools and binjitsu fork)☆279Updated 4 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 3 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆381Updated 2 years ago
- Seed recovery tool for PRNGs☆359Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆889Updated 3 years ago
- Various PoCs☆487Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆686Updated 6 years ago
- A work-in-progress deobfuscator for movfuscated binaries☆695Updated 5 months ago
- CTF Writeups☆186Updated 6 years ago
- A colleciton of CTF write-ups all using pwntools☆495Updated 7 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆216Updated 3 months ago
- Proof of Concepts (PE, PDF...)☆1,436Updated last year
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆170Updated 4 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆101Updated 6 years ago
- How to backdoor Diffie-Hellman☆610Updated 8 years ago
- Working with numbers (primes, modular, etc.)☆238Updated 2 years ago
- Using Intel's PIN tool to solve CTF problems☆486Updated 4 years ago
- binary patching from Python☆627Updated last year
- A Javascript library for browser exploitation☆863Updated 5 years ago