Solutions to Matasano crypto challenges in Python 3.
☆108May 29, 2023Updated 2 years ago
Alternatives and similar repositories for cryptopals-python3
Users that are interested in cryptopals-python3 are comparing it to the libraries listed below
Sorting:
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆34Aug 8, 2014Updated 11 years ago
- My solutions to Matasano Cryptopals challenge.☆30Nov 2, 2014Updated 11 years ago
- cryptopals answers☆23Oct 28, 2016Updated 9 years ago
- Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead☆16Aug 2, 2015Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- ☆10May 30, 2015Updated 10 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- ☆12Jun 24, 2017Updated 8 years ago
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- Ridiculously minimal event system for groups.☆11Oct 8, 2019Updated 6 years ago
- Python Powered Repository☆15Jan 22, 2020Updated 6 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Aug 27, 2018Updated 7 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- Writeups for past CTFs I've joined☆18Jun 1, 2021Updated 4 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated this week
- Volatility plugin to extract FileVault 2 VMK's☆51Sep 20, 2021Updated 4 years ago
- A collection of Volatility Framework plugins.☆26Aug 29, 2013Updated 12 years ago
- Source code to the Reverse Engineering Challenges for the CSAW 2009 competition, as well as the "scoreboard" system.☆32Nov 16, 2009Updated 16 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 2 weeks ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- File Encryption/Decryption and Implementation of Digital Signature using Elliptical Curve Cryptography technique.☆34Jun 12, 2015Updated 10 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26May 13, 2011Updated 14 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago