Attacking A Many Time Pad - Cryptography
☆52Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for many-time-pad-attack
Users that are interested in many-time-pad-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆178Aug 7, 2020Updated 5 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- ☆22Oct 24, 2016Updated 9 years ago
- Typora theme based on the CryptoHack blog☆33Mar 24, 2021Updated 5 years ago
- ☆14Jan 16, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 8 years ago
- python exp of pwnable' problems☆18Apr 19, 2026Updated 2 weeks ago
- Code to accompany the paper "Learning Grimaces By Watching TV" and FaceValue dataset☆12Aug 4, 2018Updated 7 years ago
- Prototype of fraud proofs.☆12Feb 13, 2022Updated 4 years ago
- windows inlinehook R3 R0☆11Apr 11, 2018Updated 8 years ago
- ☆11Mar 20, 2025Updated last year
- Set of pre-generated pwn.college challenges☆68Jan 24, 2023Updated 3 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆536Feb 24, 2024Updated 2 years ago
- File Encryption/Decryption and Implementation of Digital Signature using Elliptical Curve Cryptography technique.☆34Jun 12, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Fuzzing framework for third part library of android system☆22Oct 17, 2016Updated 9 years ago
- jsproxy助手是一款jsproxy代理的chrome插件☆11Jun 22, 2019Updated 6 years ago
- A library for building Merkle trees and verifying Merkle proofs, including multi-proofs. Built to be easy to understand☆11Jul 7, 2022Updated 3 years ago
- Files of Coursera, Udemy and Udacity courses☆15Nov 8, 2021Updated 4 years ago
- A CLI for Ethereum with a focus on portability☆10Jun 13, 2023Updated 2 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- Matrisea is a web-based Android reversing platform that provides high-fidelity virtual devices with powerful integrated tools☆10Mar 1, 2023Updated 3 years ago
- Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.☆12Feb 2, 2023Updated 3 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ALIEN: idA Local varIables/inLine functIons rEcogNizer☆18Dec 21, 2021Updated 4 years ago
- For the bird counters☆11Dec 8, 2022Updated 3 years ago
- Header-only C++ utilities in the style of the standard library.☆13May 31, 2022Updated 3 years ago
- Text-based tool for tracking story completion per-user on Pivotal Tracker☆46May 29, 2013Updated 12 years ago
- A tools for terminal☆14Jul 15, 2024Updated last year
- ☆41Nov 27, 2025Updated 5 months ago
- ☆14Jul 21, 2024Updated last year
- Implementation of the Kademlia protocol created to gain understanding of distributed hash tables.☆10Aug 16, 2023Updated 2 years ago
- Universal Registry Contract☆14Oct 15, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- tools for shellcoding☆59Aug 12, 2023Updated 2 years ago
- ☆11May 31, 2021Updated 4 years ago
- golang lib to buy itunes applications☆14Nov 9, 2025Updated 5 months ago
- some ida script☆33Aug 18, 2021Updated 4 years ago
- ☆15Mar 25, 2017Updated 9 years ago
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆14Nov 9, 2022Updated 3 years ago
- ☆12Apr 29, 2019Updated 7 years ago