SomMeri / matasano-cryptopals-solutionsLinks
My solutions to Matasano Cryptopals challenge.
☆30Updated 10 years ago
Alternatives and similar repositories for matasano-cryptopals-solutions
Users that are interested in matasano-cryptopals-solutions are comparing it to the libraries listed below
Sorting:
- ☆44Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆15Updated 8 years ago
- ☆27Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- ☆198Updated 9 years ago
- Public resources NB shares☆18Updated 9 years ago
- ☆13Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 9 years ago
- Memory awesomeness.☆29Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- ☆12Updated 9 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 10 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago