Problems related to computer security. Algorithms written in Python. Learn more: https://id0-rsa.pub/
☆70Jul 29, 2016Updated 9 years ago
Alternatives and similar repositories for Computer-Security-Algorithms
Users that are interested in Computer-Security-Algorithms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My ctf challenges, mostly cryptography☆15Jul 13, 2025Updated 8 months ago
- Stop Learning, Start Hacking☆139Mar 22, 2023Updated 3 years ago
- 🧩 Collection of CTF challenges written by me☆19Mar 30, 2025Updated 11 months ago
- Repo for collecting part of my public CTF challenges☆44Mar 25, 2024Updated 2 years ago
- I'll post my custom shellcode I make here!☆22Oct 23, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- Solutions to the security/cryptography problems at https://id0-rsa.pub☆20Apr 5, 2017Updated 8 years ago
- A Python3 implementation of the Wiener attack on RSA☆125Nov 3, 2025Updated 4 months ago
- A map of relationships among cryptographic primitives☆12Dec 17, 2018Updated 7 years ago
- mp3 metadata parser in rust☆14Oct 15, 2025Updated 5 months ago
- CTF Team -TeamRocketIST's website source code.☆17Aug 21, 2023Updated 2 years ago
- CTF writeups☆12Aug 10, 2020Updated 5 years ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆337Mar 25, 2022Updated 4 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆18Apr 19, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Apr 8, 2020Updated 5 years ago
- Useful crypto tools for CTF☆40Jul 2, 2022Updated 3 years ago
- RSHack - Tool for RSA CTF's challenges☆98Nov 19, 2018Updated 7 years ago
- Implementation of some information-set decoding algorithms☆10Jul 21, 2021Updated 4 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- Example web application for WebAuthn authentication presentation☆21Feb 28, 2020Updated 6 years ago
- phpfuck: using only 5 different characters to write and execute php // (^.9)☆20Nov 26, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A gui to control and manage snapcast written in python☆14Dec 28, 2025Updated 3 months ago
- Shamir's secret-sharing method in the Galois Field GF(2**8), modified implementation of the original by Daniel Silverstone☆10Jun 11, 2020Updated 5 years ago
- Simple and powerful extension for searching web and viewing website content.☆13Apr 11, 2025Updated 11 months ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,601Jun 19, 2021Updated 4 years ago
- Research and implementation for non-interactive blockchain proofs of proofs of work☆51Sep 23, 2022Updated 3 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆16Feb 13, 2017Updated 9 years ago
- Public repo for ETH Escape CTF @ Devcon 2024: https://devcon.org/☆13Dec 11, 2024Updated last year
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- ☆13May 9, 2017Updated 8 years ago
- Solution of some challenges on Cryptohack☆15Jan 6, 2024Updated 2 years ago
- Disputify - Visualisation for fault dispute games.☆12Jul 22, 2023Updated 2 years ago
- Exploiting CVE-2016-2334 7zip HFS+ vulnerability☆10Nov 29, 2017Updated 8 years ago
- A convenient way to write text and track versions.☆13Feb 15, 2025Updated last year
- Analyse PNG file format for CTF, python API and CLI☆105Apr 7, 2023Updated 2 years ago