Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+1675.56%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1846.67%)
HyperpwnA hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
Stars: ✭ 387 (+760%)
PwndraA collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (+826.67%)
GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+9226.67%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+171.11%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+551.11%)
Ctf ToolsUseful CTF Tools
Stars: ✭ 190 (+322.22%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+2717.78%)
Ctf WikiCome and join us, we need you!
Stars: ✭ 5,305 (+11688.89%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (+271.11%)
Slideswon't maintain
Stars: ✭ 79 (+75.56%)
ExropAutomatic ROPChain Generation
Stars: ✭ 191 (+324.44%)
CryptonLibrary consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Stars: ✭ 995 (+2111.11%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+2802.22%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+25380%)
FastPwnCTF中Pwn的快速利用模板(包含awd pwn)
Stars: ✭ 18 (-60%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (+46.67%)
ArmpwnRepository to train/learn memory corruption on the ARM platform.
Stars: ✭ 320 (+611.11%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (+624.44%)
AndroratAndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+655.56%)
PwndbgExploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+9184.44%)
Pwn2exploitall mine papers, pwn & exploit
Stars: ✭ 289 (+542.22%)
HeapwnLinux Heap Exploitation Practice
Stars: ✭ 344 (+664.44%)
Findcrypt GhidraIDA Pro's FindCrypt ported to Ghidra, with an updated and customizable signature database
Stars: ✭ 340 (+655.56%)
Cryptojs.swiftCross-platform cryptographic functions in swift
Stars: ✭ 42 (-6.67%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-17.78%)
Simple CryptographyScripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Stars: ✭ 40 (-11.11%)
PrivatebinA minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
Stars: ✭ 3,622 (+7948.89%)
ForgeA native implementation of TLS in Javascript and tools to write crypto-based and network-heavy webapps
Stars: ✭ 4,204 (+9242.22%)
S2n Tlss2n : an implementation of the TLS/SSL protocols
Stars: ✭ 4,029 (+8853.33%)
SnowA Rust implementation of the Noise Protocol Framework
Stars: ✭ 436 (+868.89%)
PinctfUsing Intel's PIN tool to solve CTF problems
Stars: ✭ 399 (+786.67%)
CapillaryCapillary is a library to simplify the sending of end-to-end encrypted push messages from Java-based application servers to Android clients.
Stars: ✭ 445 (+888.89%)
MbeCourse materials for Modern Binary Exploitation by RPISEC
Stars: ✭ 4,674 (+10286.67%)
CaptfencoderCaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。
Stars: ✭ 473 (+951.11%)
Welpwn💖CTF pwn framework.
Stars: ✭ 284 (+531.11%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+9900%)
Heap ViewerAn IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+1175.56%)
SecurefsFilesystem in userspace (FUSE) with transparent authenticated encryption
Stars: ✭ 518 (+1051.11%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (+1191.11%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+18977.78%)
Rando.jsThe world's easiest, most powerful random function.
Stars: ✭ 659 (+1364.44%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+1264.44%)
Libsodium.jslibsodium compiled to Webassembly and pure JavaScript, with convenient wrappers.
Stars: ✭ 665 (+1377.78%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (+1395.56%)
Libsodium PhpThe PHP extension for libsodium.
Stars: ✭ 507 (+1026.67%)
CryptomatorMulti-platform transparent client-side encryption of your files in the cloud
Stars: ✭ 6,623 (+14617.78%)