A browsable archive of all Underhanded Crypto Contest entries.
☆34Jun 5, 2019Updated 6 years ago
Alternatives and similar repositories for entries
Users that are interested in entries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21May 31, 2024Updated last year
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Tool to archive RPM packages and attest to their authenticity☆15Jun 5, 2025Updated 10 months ago
- A cryptographic method that defends against side-channel attacks☆25Nov 7, 2016Updated 9 years ago
- ☆13Oct 17, 2016Updated 9 years ago
- High-density, terminal-based binary viewer for visual pattern matching.☆21May 11, 2018Updated 7 years ago
- A compiler synthesizer for simple languages.☆15Dec 18, 2018Updated 7 years ago
- Ruby library for pure SSL/TLS handshake testing. No additional requirements.☆11Nov 8, 2021Updated 4 years ago
- POLAR☆74Feb 13, 2019Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- ☆10Jul 8, 2015Updated 10 years ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 3 months ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆15Nov 28, 2024Updated last year
- Helper library for doing async io in .net☆18Jan 29, 2012Updated 14 years ago
- Experimental support for the ZomboDB query language with SQLAlchemy☆11Nov 5, 2017Updated 8 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆19Apr 19, 2016Updated 9 years ago
- BlackHat Asia 2017 talk☆34Mar 30, 2017Updated 9 years ago
- The Authentic Software Guard☆13Dec 20, 2015Updated 10 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- ☆14May 21, 2017Updated 8 years ago
- ☆22May 5, 2020Updated 5 years ago
- SQLite3 with encryption support☆23Jan 3, 2020Updated 6 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Add Keycloak OpenID Connect support to your Quart application.☆16Apr 9, 2024Updated 2 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37May 30, 2022Updated 3 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Vanity ed25519 public keys, through Huffman Codes☆12May 15, 2017Updated 8 years ago
- Corsaro is a software suite for performing large-scale analysis of trace data. It was specifically designed to be used with passive trace…☆12Jan 30, 2020Updated 6 years ago
- ☆11Nov 6, 2018Updated 7 years ago