FiloSottile / crypto.py
A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!
☆10Updated 11 years ago
Related projects: ⓘ
- Tools for attacking cryptographic implementations.☆21Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆37Updated 9 years ago
- ☆17Updated 6 years ago
- ☆35Updated 12 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Public resources NB shares☆18Updated 8 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆34Updated 7 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆22Updated 9 years ago
- ☆30Updated 9 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 8 years ago
- ☆16Updated 10 years ago
- ☆14Updated 8 years ago
- ssh key exchange layer for scapy☆13Updated 9 years ago
- python tor client☆26Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- Tor relay nearest neighbour ranking☆10Updated 2 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 8 years ago
- Creates fuzzing inputs for command line programs using help options and man pages.☆28Updated 9 years ago
- ☆18Updated this week
- A library for efficient interception of established TCP connections☆19Updated 8 years ago