FredericJacobs / Cryptography-Stanford-NotesLinks
Notes and exercices from the Cryptography class on Coursera
☆27Updated 12 years ago
Alternatives and similar repositories for Cryptography-Stanford-Notes
Users that are interested in Cryptography-Stanford-Notes are comparing it to the libraries listed below
Sorting:
- Advanced buffer overflow and memory corruption security challenges☆190Updated 3 years ago
- Coursera Stanford Cryptography 1☆75Updated 11 years ago
- Implementations of program analysis tools with a focus on machine code☆209Updated 11 years ago
- ☆92Updated last year
- A cryptographic method that defends against side-channel attacks☆25Updated 9 years ago
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- This is the new ftrace (https://github.com/elfmaster/ftrace) - Much faster, better resolution but not complete yet! :)☆110Updated 7 years ago
- collection of evil code☆14Updated 12 years ago
- Some low-level stuff☆109Updated last year
- A selection of challenges created for UMDCTF 2017☆23Updated 6 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 10 years ago
- Python concolic execution framework for program analysis☆68Updated 11 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆143Updated 7 years ago
- CTF Writeups☆27Updated 8 years ago
- An ELF parsing and manipulation library for Python☆74Updated 11 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 8 years ago
- Notes on various topics I'm interested in☆161Updated 2 months ago
- DARPA Cyber Grand Challenge Documentation☆117Updated 9 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Updated 11 years ago
- Source code of the Whitebox Contest Submission Server☆34Updated last year
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆34Updated 11 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆37Updated 10 years ago
- ☆15Updated 5 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- Slides and very basic examples☆112Updated 8 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago