An open-source SBox analysis utility
☆19Mar 25, 2025Updated 11 months ago
Alternatives and similar repositories for SUnbox
Users that are interested in SUnbox are comparing it to the libraries listed below
Sorting:
- Cracking V8 Math.random() from arbitrary bit leaks☆35Oct 1, 2025Updated 5 months ago
- ☆67Nov 10, 2025Updated 4 months ago
- SMT based attacks on non cryptographic PRNGs☆91Mar 23, 2023Updated 2 years ago
- ☆113Apr 22, 2025Updated 10 months ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆22Mar 24, 2021Updated 4 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- A way to control devices via Bluetooth w/ an ESP32☆14Jul 6, 2024Updated last year
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- A script to factorize integers with sagemath and factordb.☆12Feb 11, 2025Updated last year
- Challenges and write-ups for GCC-CTF 2024☆19Mar 3, 2024Updated 2 years ago
- A webshell plugin and interactive shell for pentesting JoGet application.☆14May 19, 2022Updated 3 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆25Jan 15, 2025Updated last year
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- 🧩 Collection of CTF challenges written by me☆19Mar 30, 2025Updated 11 months ago
- my ctf chals☆11Jul 7, 2025Updated 8 months ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Implementation of some information-set decoding algorithms☆10Jul 21, 2021Updated 4 years ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆25Oct 2, 2023Updated 2 years ago
- ☆13Jul 23, 2023Updated 2 years ago
- Mount an S3 bucket as an NFS filesystem to use it as a Docker or Docker Compose volume.☆11Updated this week
- A script to enumerate valid usernames based on the requests response times.☆23May 3, 2022Updated 3 years ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- A set of Python tools useful for cryptography and cryptanalysis.☆14Feb 3, 2017Updated 9 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Jul 16, 2021Updated 4 years ago
- A Hugo theme using Simple.css for clean, classless styling☆10Updated this week
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- Presentations by rkm0959☆27Apr 11, 2024Updated last year
- ☆13Jul 13, 2024Updated last year
- ☆40Sep 21, 2025Updated 6 months ago
- A tool to estimate the difficulty of solving the syndrome decoding problem.☆19May 29, 2023Updated 2 years ago
- this module will automatically create evil twin and store password that user input☆15Jan 26, 2023Updated 3 years ago
- Code for the paper "AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models"☆29Sep 27, 2025Updated 5 months ago
- Simple one-stop tool to manage X.509/TLS certs and all the ACME CA authorization stuff☆21Jan 28, 2026Updated last month
- ☆17Aug 17, 2024Updated last year
- PoisonJS - De-obfuscate eval-based JavaScript obfuscation with monkey-patched eval(-like) functions.☆17Jan 28, 2020Updated 6 years ago