alerj78 / lucky7coinLinks
☆8Updated 11 years ago
Alternatives and similar repositories for lucky7coin
Users that are interested in lucky7coin are comparing it to the libraries listed below
Sorting:
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- utilities☆15Updated 11 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- An android front-end to the zcash wallet through onion services☆13Updated 8 years ago
- Ida Pro Ultimate Qt Build Guide☆27Updated 6 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- ☆14Updated 9 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Generic Executable Unpacking using Dynamic Binary Instrumentation☆12Updated 10 years ago
- ☆24Updated 8 years ago
- distributed www CMS spyder☆8Updated 8 years ago
- ☆80Updated 8 years ago
- ☆17Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Updated 9 years ago
- Memory awesomeness.☆29Updated 10 years ago
- free crypto audit☆31Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- lte security☆41Updated 9 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- Proof of Concept for Ledger Nano S MCU exploit☆168Updated 7 years ago
- THREADS Conference Archive☆16Updated 5 years ago