Useful crypto tools for CTF
☆40Jul 2, 2022Updated 3 years ago
Alternatives and similar repositories for cryptools
Users that are interested in cryptools are comparing it to the libraries listed below
Sorting:
- Generate two PDFs with different contents but identical SHA1 hashes.☆22Mar 11, 2017Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- ☆24Feb 6, 2017Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- A small script for listing and exporting WhatsApp chats☆12May 4, 2020Updated 5 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- A dumb afl-fuzz triage tool.☆14Dec 8, 2022Updated 3 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 8 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.☆24Apr 20, 2018Updated 7 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Web-based TOTP☆16Aug 24, 2021Updated 4 years ago
- Play wordlists at encrypted Exodus wallets to recover wallet password☆12Jul 7, 2021Updated 4 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Upload external IP so you can find your devices elsewhere☆16Mar 25, 2024Updated last year
- Challenges of the HeroCTF v4 edition.☆35May 3, 2023Updated 2 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Make DOS attacks android and other bluetooth devices☆18Feb 7, 2016Updated 10 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- A dump & load tool for etcd, which respects all key properties (including indexes) of public keys.☆24Jun 26, 2018Updated 7 years ago
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- A simple python packet sniffer and manipulation tool for linux☆18Nov 26, 2015Updated 10 years ago
- A proof of concept project that demonstrates oWASP.org's top 10 web vulnerabilities☆21Jun 22, 2015Updated 10 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago