alerj78 / lucky7coin
☆8Updated 10 years ago
Alternatives and similar repositories for lucky7coin:
Users that are interested in lucky7coin are comparing it to the libraries listed below
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Yet another scrypt coin☆25Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- ☆80Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- ☆24Updated 3 years ago
- distributed www CMS spyder☆8Updated 7 years ago
- An android front-end to the zcash wallet through onion services☆13Updated 7 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- utilities☆15Updated 11 years ago
- Ida Pro Ultimate Qt Build Guide☆26Updated 6 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 8 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Updated 4 years ago
- ☆17Updated 7 years ago
- Proof of Concept for Ledger Nano S MCU exploit☆167Updated 7 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 9 years ago
- ☆14Updated 9 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- crack text files encrypted with vim's :X command☆22Updated 9 years ago
- Repo for the paper "USB Devices phoning home"☆22Updated 9 years ago
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Updated 12 years ago
- ☆15Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Simulates Attacks of AB16 on Argon2i☆11Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Very simple runtime hooking library for OS X.☆15Updated 9 years ago