EiNSTeiN- / chosen-plaintextView external linksLinks
A small python library for exploiting simple chosen-plaintext attacks.
☆40May 3, 2014Updated 11 years ago
Alternatives and similar repositories for chosen-plaintext
Users that are interested in chosen-plaintext are comparing it to the libraries listed below
Sorting:
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Basic raw packet sniffer in Python - Cybrary☆12Nov 21, 2017Updated 8 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- Fuzzing framework written in OCaml☆33Aug 23, 2016Updated 9 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- A sandboxed Python subset for safe evaluation☆32Jun 28, 2022Updated 3 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 5 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- ☆16May 15, 2021Updated 4 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Jul 9, 2022Updated 3 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Feb 2, 2018Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 10 months ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- Solutions to the security/cryptography problems at https://id0-rsa.pub☆20Apr 5, 2017Updated 8 years ago
- ☆40Apr 21, 2015Updated 10 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Oct 6, 2017Updated 8 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- ☆30Jan 6, 2021Updated 5 years ago
- Python concolic execution framework for program analysis☆68Nov 13, 2014Updated 11 years ago
- ☆26Mar 12, 2020Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- Example of building and running an eBPF program in Rust☆33Sep 27, 2018Updated 7 years ago