cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys
☆178Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for cribdrag
Users that are interested in cribdrag are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,125Dec 2, 2021Updated 4 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- Attacking A Many Time Pad - Cryptography☆52Feb 10, 2022Updated 4 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- A cryptographic crib maniplation tool☆20Aug 16, 2025Updated 7 months ago
- A tool to analyze multi-byte xor cipher☆1,478May 21, 2025Updated 10 months ago
- ☆13Aug 18, 2016Updated 9 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆102Nov 3, 2017Updated 8 years ago
- A portable, padding oracle exploit API☆332Dec 1, 2022Updated 3 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Fuck capstone.CsError: Different API version between core & binding (CS_ERR_VERSION)☆13Nov 16, 2017Updated 8 years ago
- ☆280May 21, 2020Updated 5 years ago
- A pairing library of elliptic curve☆60Mar 4, 2024Updated 2 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- A repository of tools and scripts related to malware analysis☆254Jul 29, 2016Updated 9 years ago
- Project for a Computer Security class based on CSAW capture the flag challenges☆13Mar 19, 2014Updated 12 years ago
- ☆14Mar 31, 2018Updated 8 years ago
- A library to facilitate the exploitation of padding oracle attacks☆15Apr 1, 2015Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆447Aug 7, 2020Updated 5 years ago
- Cracking 2DES using a meet-in-the-middle attack implemented in python 3.☆15Sep 27, 2015Updated 10 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆537Feb 24, 2024Updated 2 years ago
- Simple REST-style web service for the CVE searching☆97May 19, 2023Updated 2 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆10Oct 5, 2015Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,107Feb 28, 2025Updated last year
- RSHack - Tool for RSA CTF's challenges☆99Nov 19, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆12Aug 4, 2015Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Manage building and deploying exploitation challenges with ease☆59Oct 26, 2025Updated 5 months ago
- ☆16Mar 26, 2017Updated 9 years ago
- ☆1,193Jan 27, 2025Updated last year
- SpiderLabs shared Nmap Tools☆231Aug 7, 2020Updated 5 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago