My solutions and explanations of the http://cryptopals.com/ challenges.
☆26Jul 6, 2021Updated 4 years ago
Alternatives and similar repositories for matasano-cryptopals
Users that are interested in matasano-cryptopals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- RuCTF 2019. Developed with ♥ by Hackerdom team☆13Nov 28, 2021Updated 4 years ago
- Coursera Cryptography Course Scripts☆16Mar 13, 2013Updated 13 years ago
- The CYC1000 is the next generation of Arrow’s FPGA IoT/Maker boards based on the latest Intel FPGA family Cyclone 10 LP.☆10Jan 27, 2022Updated 4 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆16Jan 6, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 8 months ago
- ☆11Sep 4, 2019Updated 6 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated last year
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- setup Ghidra environment for GitHub Actions☆17Jun 19, 2023Updated 2 years ago
- ☆14Aug 25, 2018Updated 7 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- ☆12Jan 5, 2022Updated 4 years ago
- Code from the book "FreeBSD Device Drivers: A Guide for the Intrepid"☆12Oct 10, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Open-source challenges for Naumachia☆13Sep 18, 2023Updated 2 years ago
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆42Updated this week
- A 3D printed, case for the Sofle v2.0w keyboard☆16Jul 22, 2023Updated 2 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- My solutions and writeups for the CTF challenges hosted @ backdoor.sdslabs.co☆10Oct 23, 2017Updated 8 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Shell scripts for decompiling and analyzing binary files through the retdec.com REST API.☆12Jun 17, 2018Updated 7 years ago
- A neat CTFd Dark Theme☆19Feb 1, 2019Updated 7 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- List of crackpot 'scientists' and 'thinkers'☆24Jun 22, 2025Updated 10 months ago
- next.js + mobx state tree + antd- + react-intl + auth starter☆15Apr 8, 2018Updated 8 years ago
- Maciej Sypien personal dotfiles for macOS, Linux (ubuntu)☆11Apr 13, 2026Updated last month
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 7 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆17Sep 12, 2019Updated 6 years ago
- Sine Wave Explorer☆14Jan 2, 2023Updated 3 years ago
- ☆13May 9, 2021Updated 5 years ago
- A smooth, cushiony layer of cache.☆48Oct 29, 2019Updated 6 years ago
- Ghidra extension to disassemble NSIS installers☆25Sep 8, 2025Updated 8 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Python script for scraping product reviews☆14Dec 14, 2020Updated 5 years ago
- Kal Online game reverse engineering / modding☆20May 10, 2020Updated 6 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆20Nov 18, 2019Updated 6 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- CTF writeup for learning☆22Apr 6, 2021Updated 5 years ago
- This arduino sketch uses the Digispark Attiny85 DigiKeyboard library to carry out a HID attack on a Windows 10 machine. The attack consis…☆18Jan 8, 2021Updated 5 years ago