☆21Nov 7, 2016Updated 9 years ago
Alternatives and similar repositories for twctf-2016-problems
Users that are interested in twctf-2016-problems are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ☆13Jun 9, 2020Updated 5 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Kudelski Security's 2017 crypto challenge☆20Jul 6, 2017Updated 8 years ago
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆13May 30, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- IDA Pro plugin to view Exports☆17Sep 21, 2018Updated 7 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- ☆18Aug 14, 2019Updated 6 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- MLRan: A Ransomware Behavioural Dataset for Machine Learning☆46Jun 17, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- ☆113Oct 17, 2017Updated 8 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Repo for colecting all my public CTF challenges☆28Dec 23, 2024Updated last year
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Hot reload DLL on windows☆11Oct 7, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Solutions for all programming assignments from Stanford's University Online Cryptography Course (C#)☆11Apr 12, 2015Updated 10 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- various CTF writeups☆61Jun 28, 2018Updated 7 years ago
- use afl to fuzz swift program☆24Nov 3, 2017Updated 8 years ago
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago
- Source files and writeups for UTCTF 2019☆14Oct 21, 2020Updated 5 years ago
- A dedicated repo to interact with the API of Timesketch☆12Sep 17, 2021Updated 4 years ago