A pure Python implementation of AES
☆210Dec 7, 2020Updated 5 years ago
Alternatives and similar repositories for AES-Python
Users that are interested in AES-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python implementation of the block cipher RC4☆41Dec 7, 2017Updated 8 years ago
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆36Feb 15, 2021Updated 5 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆12Jul 13, 2018Updated 7 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- ☆10Jun 11, 2018Updated 7 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated 2 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- Tool for monitoring shared event loops with Javascript☆13Feb 19, 2018Updated 8 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- CTF中那些脑洞大开的编码和加密☆30Jun 4, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).☆46Aug 5, 2017Updated 8 years ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- Command Line Utility to send TCP RST packets to endpoints in your WLAN (subnet)☆15Dec 6, 2014Updated 11 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Apr 17, 2023Updated 3 years ago
- Complex multiplication based factorization☆41Feb 21, 2022Updated 4 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆26Apr 23, 2021Updated 5 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- learn pwn☆17May 30, 2020Updated 5 years ago
- DES algorithm implementation in C☆79Jul 21, 2020Updated 5 years ago
- TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation☆14Jan 24, 2023Updated 3 years ago
- Some crypto scripts which is useful in study and ctf☆28Sep 2, 2021Updated 4 years ago
- Coppersmith's method for multivariate polynomials☆196Oct 11, 2023Updated 2 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆125Dec 21, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- 한국 도시 철도의 이전/다음역 및 노선번호 정보를 그래프 자료구조로 표현.☆17Nov 16, 2022Updated 3 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆17Jul 12, 2021Updated 4 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆20Dec 30, 2024Updated last year
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago