nullpsifer / cryptosploit
☆10Updated 8 months ago
Alternatives and similar repositories for cryptosploit:
Users that are interested in cryptosploit are comparing it to the libraries listed below
- Web Exploitation Workflow for CTF Challenges☆49Updated 8 years ago
- RSHack - Tool for RSA CTF's challenges☆95Updated 6 years ago
- CTF writeups from The Flat Network Society☆133Updated 3 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆546Updated this week
- Example reports from prior years of the Collegiate Penetration Testing Competition☆144Updated 10 months ago
- CBC Bit-Flipping Attack Example with Python☆12Updated last year
- Discord webhook plugin for CTFd☆35Updated 8 months ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- Symbolic execution for the XorShift128+ algorithm.☆103Updated 5 years ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆96Updated 3 years ago
- A multi-tenant network sandbox for security challenges☆79Updated 4 months ago
- ☆202Updated 10 years ago
- A memorial site for Hackers and Infosec people who have passed☆133Updated 2 weeks ago
- Password decryption tool for the McAfee SiteList.xml file☆132Updated 11 months ago
- ☆162Updated 2 years ago
- esoteric☆51Updated 4 years ago
- OSEE Preparation☆175Updated 6 years ago
- Used to check for TCP and UDP egress filtering on both windows and unix client systems☆147Updated 4 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆102Updated 4 years ago
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆102Updated 4 years ago
- ☆103Updated 2 years ago
- ☆47Updated 8 years ago
- Automatic exploit generation for simple linux pwn challenges.☆320Updated last year
- A community driven resource for learning CryptoGraphy☆60Updated last year
- Game Board for NorthSec's Hacker Jeopardy since 2017☆14Updated 6 months ago
- Writeups for the ACI Cyberstakes CTF 2018☆23Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆142Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆63Updated 3 years ago
- Collection of things made during my OSCP journey☆257Updated 7 years ago