FredericJacobs / Cryptography-Stanford-NotesLinks
Notes and exercices from the Cryptography class on Coursera
☆27Updated 11 years ago
Alternatives and similar repositories for Cryptography-Stanford-Notes
Users that are interested in Cryptography-Stanford-Notes are comparing it to the libraries listed below
Sorting:
- ☆24Updated 8 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Collection of scripts that were once useful for reverse engineering things☆75Updated 15 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Ida Pro Ultimate Qt Build Guide☆26Updated 6 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- Hacking Games in a Hacked Game☆29Updated 10 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago
- Translate regular Assembly into Extended Instructions☆87Updated 12 years ago
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- ☆15Updated 4 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Updated 7 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- ☆89Updated 10 months ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Collection of scripts for radare2☆27Updated 6 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆29Updated 10 years ago
- THREADS Conference Archive☆16Updated 5 years ago
- Bootkits Revisited☆40Updated 11 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- A project that uses Binary Ninja and GRAKN.AI to perform static analysis on binary files with the goal of identifying bugs in software.☆33Updated 7 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 11 years ago
- Some low-level stuff☆105Updated last year
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago