FiloSottile / crypto.pyLinks
A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!
☆10Updated 12 years ago
Alternatives and similar repositories for crypto.py
Users that are interested in crypto.py are comparing it to the libraries listed below
Sorting:
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Little bit of this, little bit of that☆91Updated 2 months ago
- Android wireless karma attack detector☆67Updated 10 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- lte security☆42Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- A set of codecs for python that are useful to have for CTF or general hacking.☆35Updated 7 years ago
- Fuzzing things with afl and python-afl☆59Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 6 years ago
- Statically linked Library detector☆70Updated 11 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 12 years ago
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- ☆35Updated 13 years ago
- Public resources NB shares☆18Updated 9 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 10 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆75Updated 9 years ago
- ☆30Updated 10 years ago
- Kippo configured to be a backdoored netscreen☆11Updated 10 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- setroubleshootd xSports☆93Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- ☆18Updated 8 years ago