alerj78 / lucky7coinLinks
☆8Updated 11 years ago
Alternatives and similar repositories for lucky7coin
Users that are interested in lucky7coin are comparing it to the libraries listed below
Sorting:
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- An android front-end to the zcash wallet through onion services☆13Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- Small and cheap standalone USB sanitizer☆43Updated 4 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- distributed www CMS spyder☆8Updated 8 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- ☆14Updated 9 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- utilities☆15Updated 12 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- Yet another scrypt coin☆25Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- ☆15Updated 7 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 10 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- Ida Pro Ultimate Qt Build Guide☆27Updated 6 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Crypto scanner☆43Updated 14 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago