A pure Python implementation of AES
☆208Dec 7, 2020Updated 5 years ago
Alternatives and similar repositories for AES-Python
Users that are interested in AES-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A pure Python implementation of AES, with optional CBC, PCBC, CFB, OFB and CTR cipher modes.☆202Aug 18, 2024Updated last year
- Implementation of Rijndael cipher algorithm☆45Nov 13, 2023Updated 2 years ago
- A python implementation of the block cipher RC4☆41Dec 7, 2017Updated 8 years ago
- Pure-Python implementation of AES block-cipher and common modes of operation.☆470Jan 17, 2024Updated 2 years ago
- A C implementation of AES got from OpenSSL☆14Dec 19, 2011Updated 14 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- ☆12Jul 13, 2018Updated 7 years ago
- Implementation of RC6 encryption and decryption in python.☆20Mar 11, 2017Updated 9 years ago
- Implementation of Advance Encryption Standard (AES-128/192/256/512) using Python and Numpy☆12Nov 7, 2022Updated 3 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated 2 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CTF中那些脑洞大开的编码和加密☆30Jun 4, 2017Updated 8 years ago
- A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).☆46Aug 5, 2017Updated 8 years ago
- Translating WebAssembly into the most simple LLVM IR.☆15Jan 6, 2026Updated 3 months ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- 🧩 Collection of CTF challenges written by me☆19Mar 30, 2025Updated last year
- Complex multiplication based factorization☆41Feb 21, 2022Updated 4 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- IDA Python Scripts☆46Jul 19, 2009Updated 16 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- ☆26Apr 23, 2021Updated 4 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- learn pwn☆17May 30, 2020Updated 5 years ago
- O(n log n) algorithm finding solutions of Erdős-Ginzburg-Ziv theorem.☆14Aug 18, 2022Updated 3 years ago
- TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation☆14Jan 24, 2023Updated 3 years ago
- Some crypto scripts which is useful in study and ctf☆28Sep 2, 2021Updated 4 years ago
- Sample embedded defense code for applications written in .NET, Java, PHP and Python.☆11Feb 23, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆124Dec 21, 2024Updated last year
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- Manage efficiently your heavy side-channel datasets with eShard library and process them with http://gitlab.com/eshard/scared. This is a …☆14Jan 28, 2026Updated 2 months ago
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- ☆44Jun 27, 2022Updated 3 years ago
- DL-LA: Deep Learning Leakage Assessment. Source Code and Traces.☆17Nov 9, 2023Updated 2 years ago