A small python library for exploiting simple chosen-plaintext attacks.
☆40May 3, 2014Updated 11 years ago
Alternatives and similar repositories for chosen-plaintext
Users that are interested in chosen-plaintext are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fuzzing framework written in OCaml☆33Aug 23, 2016Updated 9 years ago
- ☆40Apr 21, 2015Updated 10 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- Solutions to the security/cryptography problems at https://id0-rsa.pub☆20Apr 5, 2017Updated 8 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Oct 9, 2015Updated 10 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- Subclass of UIActivityIndicatorView allowing you to set your own image.☆21Aug 15, 2013Updated 12 years ago
- Example Manticore scripts☆68Dec 7, 2023Updated 2 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Small Jekyll template to present an iPhone app with a static site☆24Sep 1, 2014Updated 11 years ago
- A purely academic effort to compile a subset of C to a 3-symbol, 5-tape simulated turing machine ruleset.☆11Sep 17, 2011Updated 14 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Load function names from an IDA Pro database inside GDB☆21Oct 20, 2018Updated 7 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- ☆92Jan 17, 2019Updated 7 years ago
- Stanford Cryptography class excercises☆20May 13, 2012Updated 13 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Exemple d'extension Burp permettant d'utiliser les fichiers de configuration de proxy PAC☆11Feb 28, 2016Updated 10 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Feb 2, 2018Updated 8 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Jul 28, 2025Updated 8 months ago
- spring mvc cve-2014-3625☆32Mar 11, 2016Updated 10 years ago
- Some new commands debug heap for peda☆100Apr 6, 2025Updated 11 months ago
- Pure Rust implementation of LZ4 compression and decompression as a library☆17Jun 9, 2020Updated 5 years ago
- An introductory tutorial for the Coq proof assistant.☆10Feb 5, 2019Updated 7 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago