JesseEmond / matasano-cryptopalsLinks
My solutions and explanations of the http://cryptopals.com/ challenges.
☆26Updated 4 years ago
Alternatives and similar repositories for matasano-cryptopals
Users that are interested in matasano-cryptopals are comparing it to the libraries listed below
Sorting:
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆176Updated 5 years ago
- Small python module for common CTF crypto functions☆165Updated 3 years ago
- Useful crypto tools for CTF☆40Updated 3 years ago
- VoidHack CTF write-ups☆60Updated 6 years ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆214Updated 6 years ago
- RSHack - Tool for RSA CTF's challenges☆100Updated 7 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated last month
- Writeups to Crypto Challenges in CTFs☆40Updated 7 years ago
- ☆88Updated 7 years ago
- All CTF events☆75Updated 4 years ago
- Guide to buffer overflows☆59Updated 4 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆53Updated 9 years ago
- Web Exploitation Workflow for CTF Challenges☆52Updated 9 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆53Updated 9 years ago
- Team Page☆15Updated 7 years ago
- 🏴 Collection of CTF solutions☆74Updated 6 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆14Updated 6 years ago
- Upcoming list of ctfs directly in your terminal!☆16Updated 2 years ago
- EmpireCTF – write-ups, capture the flag, cybersecurity☆133Updated 5 months ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- Docker image for attacking cryptography CTF challenges☆112Updated last year
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 3 years ago
- ☆21Updated 4 years ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆23Updated 7 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- ☆22Updated 9 years ago
- Exploiting challenges in Linux and Windows☆119Updated 5 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Challenge repo from TAMUctf 2020☆22Updated 5 years ago
- Exploitation and Mitigation Slides☆133Updated last year