RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways
☆180May 4, 2017Updated 8 years ago
Alternatives and similar repositories for RsaCtfTool
Users that are interested in RsaCtfTool are comparing it to the libraries listed below
Sorting:
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- Working with numbers (primes, modular, etc.)☆246Jul 15, 2022Updated 3 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- GATEKEEPER: Inline and on-target defense☆123Sep 1, 2022Updated 3 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Jan 30, 2020Updated 6 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- Visualization of heap operations.☆617Dec 5, 2024Updated last year
- Simple hash-mining c library and its python binding.☆64Jun 28, 2019Updated 6 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Mar 5, 2018Updated 7 years ago
- IDA PRO Loader for 3DSX files☆51Dec 26, 2021Updated 4 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆345May 5, 2019Updated 6 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,301Updated this week
- Collaborative Reverse Engineering plugin for IDA Pro & Hex-Rays☆666Feb 17, 2021Updated 5 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 9 years ago
- Run basic functions from stripped binaries cross platform☆113Dec 13, 2016Updated 9 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Apr 3, 2017Updated 8 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Jul 12, 2015Updated 10 years ago
- Hex-Rays Decompiler Enhanced View☆184Sep 21, 2018Updated 7 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆536Feb 24, 2024Updated 2 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,612Jun 11, 2025Updated 8 months ago
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago