nneonneo / sha1collider
Build two PDFs that have different content but identical SHA1 sums.
☆431Updated 3 months ago
Alternatives and similar repositories for sha1collider
Users that are interested in sha1collider are comparing it to the libraries listed below
Sorting:
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆174Updated 4 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Working with numbers (primes, modular, etc.)☆243Updated 2 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2018☆269Updated 6 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆102Updated 7 years ago
- Seed recovery tool for PRNGs☆381Updated 6 years ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- CTF framework and exploit development library in python3 (pwntools and binjitsu fork)☆282Updated 5 years ago
- ☆1,120Updated 3 months ago
- Simplify format string exploitation.☆339Updated 3 years ago
- A colleciton of CTF write-ups all using pwntools☆513Updated 8 years ago
- CTF Writeups☆186Updated 7 years ago
- ☆269Updated 2 years ago
- Padding oracle attack against PKCS7☆332Updated 2 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆385Updated 2 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2013☆230Updated 9 years ago
- A tiny and cute URL fuzzer☆394Updated 2 years ago
- CTF write-ups by Plaid Parliament of Pwning☆788Updated 11 months ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- A collection of tools used to maintain and create CTF write-up folders☆235Updated 8 years ago
- A tool for predicting the output of random number generators☆191Updated 8 years ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆211Updated 5 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,105Updated 3 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆227Updated 3 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 4 years ago
- Proof of Concepts (PE, PDF...)☆1,501Updated 4 months ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆256Updated last year
- Probe a rendering engine for vulnerabilities and other features☆367Updated 3 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆497Updated 3 years ago