A browsable archive of all Underhanded Crypto Contest entries.
☆34Jun 5, 2019Updated 6 years ago
Alternatives and similar repositories for entries
Users that are interested in entries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Non-C Implementations of the yescrypt KDF.☆30Jan 16, 2019Updated 7 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- ☆19Nov 22, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Tool to archive RPM packages and attest to their authenticity☆14Jun 5, 2025Updated 10 months ago
- A compiler synthesizer for simple languages.☆15Dec 18, 2018Updated 7 years ago
- POLAR☆74Feb 13, 2019Updated 7 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- ☆10Jul 8, 2015Updated 10 years ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 4 months ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆15Nov 28, 2024Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- ugly code to check linux kernel memory and dump some internal structures☆48Nov 20, 2024Updated last year
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆19Apr 19, 2016Updated 10 years ago
- BlackHat Asia 2017 talk☆34Mar 30, 2017Updated 9 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- ☆22May 5, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37May 30, 2022Updated 3 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- Resistance Core☆10Feb 15, 2021Updated 5 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Vanity ed25519 public keys, through Huffman Codes☆12May 15, 2017Updated 8 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆18Aug 31, 2018Updated 7 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago
- A simpler alternative to the Noise protocol framework.☆23Jan 6, 2021Updated 5 years ago
- OSoMe API mashups☆11Jan 29, 2019Updated 7 years ago
- CONIKS design documents☆16Nov 14, 2016Updated 9 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- A Python tool to manage and tag your bibliography (.bib and .pdf) files on Dropbox☆14Apr 20, 2026Updated last week
- Shamir's secret-sharing method in the Galois Field GF(2**8), modified implementation of the original by Daniel Silverstone☆10Jun 11, 2020Updated 5 years ago