A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).
☆46Aug 5, 2017Updated 8 years ago
Alternatives and similar repositories for AES-GCM-Python
Users that are interested in AES-GCM-Python are comparing it to the libraries listed below
Sorting:
- ☆17May 22, 2021Updated 4 years ago
- A python implementation of the block cipher RC4☆41Dec 7, 2017Updated 8 years ago
- This repository contains prototype software implementation of Threshold FHE, i.e., Fully Homomorphic Encryption with threshold decryption…☆10Dec 1, 2022Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Jun 30, 2023Updated 2 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- ☆10Oct 18, 2024Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- A simple implementation of the Karatsuba multiplication algorithm☆11Apr 2, 2025Updated 10 months ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated last year
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- Range Traffic Generator - Used to simulate browsing traffic on a range.☆11May 24, 2017Updated 8 years ago
- Fluorite: Apache Calcite trace analyzer☆12Apr 15, 2019Updated 6 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- Stuff from CTF contests☆39Jun 24, 2019Updated 6 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- ☆13Jan 4, 2017Updated 9 years ago
- A curated list of Rust code and resources. With repository stars⭐ and forks🍴☆14Updated this week
- Python bit pattern library for instruction encodings. Bytes in, IR out!☆15Mar 6, 2022Updated 3 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- ☆12Jul 14, 2018Updated 7 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- repo about binary exploitation☆12Dec 5, 2023Updated 2 years ago
- Lightweight, low-dependency wrapper for basic WMI functionality on Windows.☆14Jan 27, 2026Updated last month
- Writeups to Crypto Challenges in CTFs☆41Dec 9, 2018Updated 7 years ago
- 个人渗透时开发的一些辅助脚本☆13Aug 3, 2017Updated 8 years ago
- My Python WorkSpace☆11Mar 30, 2018Updated 7 years ago
- A 3d raycaster that renders to ASCII text.☆15May 15, 2017Updated 8 years ago
- C++ coroutine protocol library.☆12Sep 2, 2025Updated 5 months ago
- Repository for the defense mechanism of the paper "The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"☆10Feb 10, 2022Updated 4 years ago
- Communicate with Allen Bradley Slc500 and Micrologix using the go language☆10Jan 8, 2017Updated 9 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 4 years ago
- Acquisition is a mechanism that allows objects to obtain attributes from the containment hierarchy they're in.☆12Nov 29, 2025Updated 3 months ago
- ☆14Jul 26, 2025Updated 7 months ago
- ☆11Aug 10, 2019Updated 6 years ago
- ☆10Jun 11, 2022Updated 3 years ago