☆24Jan 21, 2022Updated 4 years ago
Alternatives and similar repositories for ecdsapivot
Users that are interested in ecdsapivot are comparing it to the libraries listed below
Sorting:
- Ethereum DEVnet - one node, automatic address generation, genesis block setup + mining script ~160MB☆12Mar 6, 2021Updated 5 years ago
- Este projeto é fruto de um estudo pessoal sobre o algoritmo Secp256k1. O objetivo dele é conseguir obter, usando apenas os valores da cha…☆12Dec 7, 2022Updated 3 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆16Jul 15, 2020Updated 5 years ago
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Generate random test credit card numbers for testing, validation and/or verification purposes.☆12Nov 28, 2021Updated 4 years ago
- Easily load JSON objects and decode them into structs or classes☆22Apr 9, 2019Updated 6 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- Tool for brute forcing BIP39 seed phrases☆10Feb 25, 2021Updated 5 years ago
- VanitySearch, v1.15.4, fork, fix - bitcrack☆37Jun 1, 2020Updated 5 years ago
- Sweep funds to another address☆10Dec 10, 2020Updated 5 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated 2 years ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- ☆14Nov 9, 2020Updated 5 years ago
- Tools for btc hacking☆13Feb 21, 2021Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.☆24Apr 20, 2018Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- A docker image to host one's DNS-over-HTTPS proxy☆28Jun 11, 2019Updated 6 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- A tool to create multisig addresses and transactions☆20Jun 9, 2017Updated 8 years ago
- ☆42Jun 27, 2022Updated 3 years ago
- Crackhash is a tool that try to crack different types of hashes using free online services.☆25Oct 29, 2019Updated 6 years ago
- Control thousands of WS2811/2812 LEDs at video refresh speeds☆12May 5, 2015Updated 10 years ago
- GUI wireless 802.11 penetration tool☆12Oct 7, 2016Updated 9 years ago
- Website for pid.codes☆13Apr 10, 2015Updated 10 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Jun 1, 2021Updated 4 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 11 years ago
- A public IP API service.☆10Oct 15, 2019Updated 6 years ago
- Attacks on ECDSA/SM2 signing algorithms☆15Mar 15, 2019Updated 7 years ago
- A Twitter bot that archives tweets on demand.☆27Jun 24, 2018Updated 7 years ago
- Software Aided Image Nuking Technology☆12Oct 3, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆28May 8, 2023Updated 2 years ago