A browsable archive of all Underhanded Crypto Contest entries.
☆34Jun 5, 2019Updated 6 years ago
Alternatives and similar repositories for entries
Users that are interested in entries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Non-C Implementations of the yescrypt KDF.☆30Jan 16, 2019Updated 7 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- ☆12Apr 8, 2019Updated 7 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- ☆13Oct 17, 2016Updated 9 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Tool to archive RPM packages and attest to their authenticity☆14Jun 5, 2025Updated 11 months ago
- High-density, terminal-based binary viewer for visual pattern matching.☆21May 11, 2018Updated 8 years ago
- A compiler synthesizer for simple languages.☆15Dec 18, 2018Updated 7 years ago
- Ruby library for pure SSL/TLS handshake testing. No additional requirements.☆11Nov 8, 2021Updated 4 years ago
- ☆10Jul 8, 2015Updated 10 years ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Helper library for doing async io in .net☆18Jan 29, 2012Updated 14 years ago
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- ugly code to check linux kernel memory and dump some internal structures☆48Nov 20, 2024Updated last year
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- BlackHat Asia 2017 talk☆34Mar 30, 2017Updated 9 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆19Apr 19, 2016Updated 10 years ago
- The Authentic Software Guard☆13Dec 20, 2015Updated 10 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- SQLite3 with encryption support☆23Jan 3, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Add Keycloak OpenID Connect support to your Quart application.☆16Apr 9, 2024Updated 2 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆13Oct 5, 2022Updated 3 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆18Aug 31, 2018Updated 7 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- The Tahoe-LAFS decentralized secure filesystem.☆16Aug 27, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A coding challenge to learn Rust☆14Oct 19, 2017Updated 8 years ago
- Design documents related to the decompilation pipeline.☆30Aug 25, 2025Updated 8 months ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago
- A simpler alternative to the Noise protocol framework.☆24Jan 6, 2021Updated 5 years ago
- CONIKS design documents☆16Nov 14, 2016Updated 9 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Shamir's secret-sharing method in the Galois Field GF(2**8), modified implementation of the original by Daniel Silverstone☆10Jun 11, 2020Updated 5 years ago