Jwomers / many-time-pad-attackView external linksLinks
Attacking A Many Time Pad - Cryptography
☆52Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for many-time-pad-attack
Users that are interested in many-time-pad-attack are comparing it to the libraries listed below
Sorting:
- ALIEN: idA Local varIables/inLine functIons rEcogNizer☆18Dec 21, 2021Updated 4 years ago
- Many-Time Pad Interactive☆176Feb 9, 2024Updated 2 years ago
- 使用intel pin来求解一部分CTF challenge☆32Jul 1, 2018Updated 7 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- ☆17Dec 30, 2020Updated 5 years ago
- ☆22Oct 24, 2016Updated 9 years ago
- AST interpreter with clang 5.0.0 and llvm 5.0.0☆14Dec 7, 2019Updated 6 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Jun 20, 2017Updated 8 years ago
- qemu vulnerablity.☆55May 25, 2021Updated 4 years ago
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- File Encryption/Decryption and Implementation of Digital Signature using Elliptical Curve Cryptography technique.☆34Jun 12, 2015Updated 10 years ago
- ☆27May 25, 2022Updated 3 years ago
- All architecture and all version of gdbserver.☆31Sep 23, 2022Updated 3 years ago
- some ida script☆34Aug 18, 2021Updated 4 years ago
- A Python3 implementation of the Wiener attack on RSA☆125Nov 3, 2025Updated 3 months ago
- A repository trying to collect things related to LLL☆73Sep 10, 2024Updated last year
- Algorithms Course Repo☆26Apr 23, 2025Updated 9 months ago
- Typora theme based on the CryptoHack blog☆33Mar 24, 2021Updated 4 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆535Feb 24, 2024Updated last year
- Cryptography & CTF Writeups☆83Feb 20, 2023Updated 2 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Prototype of fraud proofs.☆12Feb 13, 2022Updated 4 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆13Nov 9, 2022Updated 3 years ago
- Universal Registry Contract☆14Oct 15, 2025Updated 3 months ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- two heap address leak bugs in `usosvc` service☆89Aug 25, 2020Updated 5 years ago
- Windows 98 Web Simulator☆36Jul 9, 2019Updated 6 years ago
- WMCTF2020-WriteUp☆35Aug 5, 2020Updated 5 years ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆33Sep 22, 2025Updated 4 months ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- aries-acapy-plugins☆10Updated this week
- 汇集各类字体,包括手写体,韩文等☆11Jan 24, 2024Updated 2 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- ☆12Apr 1, 2025Updated 10 months ago