FredericJacobs / Cryptography-Stanford-NotesLinks
Notes and exercices from the Cryptography class on Coursera
☆27Updated 11 years ago
Alternatives and similar repositories for Cryptography-Stanford-Notes
Users that are interested in Cryptography-Stanford-Notes are comparing it to the libraries listed below
Sorting:
- ☆23Updated 8 years ago
- ☆91Updated last year
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 11 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 10 years ago
- ☆38Updated 10 years ago
- Collection of scripts that were once useful for reverse engineering things☆75Updated 15 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 8 years ago
- Python concolic execution framework for program analysis☆68Updated 11 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆50Updated last year
- ☆15Updated 5 years ago
- GryphonCTF 2016 Challenges Repository.☆17Updated 8 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Updated 9 years ago
- Python bindings for the Hexrays Decompiler☆88Updated 4 years ago
- Binary analysis platform based on Octopus and Radare2☆78Updated 9 years ago
- Uncategorized utilities☆55Updated 6 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Translate regular Assembly into Extended Instructions☆88Updated 13 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 10 years ago
- Some low-level stuff☆108Updated last year
- ☆14Updated 10 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Updated 8 years ago
- ☆19Updated 9 years ago
- CTF writeups☆113Updated 8 years ago
- A pin tool to visualise heap operations☆21Updated 10 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 9 years ago
- Binary Analysis Platform☆74Updated 12 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago