A Python implementation of the block cipher IDEA
☆15Nov 24, 2017Updated 8 years ago
Alternatives and similar repositories for IDEA-Python
Users that are interested in IDEA-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Trivium Stream Cipher in Python☆17Jan 23, 2018Updated 8 years ago
- Implementation of RC6 encryption and decryption in python.☆20Mar 11, 2017Updated 9 years ago
- ☆16Apr 12, 2024Updated 2 years ago
- Bring fast TEA cipher to Python. Powered by Rust.☆17Oct 8, 2025Updated 6 months ago
- A pure Python skiplist implementation. For fun.☆24Dec 3, 2013Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implementation of Strumok stream cipher☆19Aug 20, 2022Updated 3 years ago
- Code for creating, using, and cloning MT19937 Mersenne Twister PRNGs☆17Dec 5, 2020Updated 5 years ago
- KeePass Salsa20 Cipher Plugin☆24Apr 13, 2016Updated 10 years ago
- ☆10Mar 24, 2022Updated 4 years ago
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- miniLCTF 2022 Challenges and writeup☆32May 15, 2022Updated 3 years ago
- C# Implement of F5 Algorithm for JPEG Steganography☆18Nov 8, 2023Updated 2 years ago
- Python Keeloq implementation☆23Oct 21, 2020Updated 5 years ago
- Website of Project SEKAI, a CTF team.☆22Dec 15, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DLL hijack codes for cmake on windows.☆25Jun 26, 2023Updated 2 years ago
- 电子科技大学实验报告latex模板☆10Dec 12, 2019Updated 6 years ago
- GOST R 34.11-2012 (Stribog) Hash Function implementation for PHP.☆18Mar 15, 2026Updated last month
- 安全编码实例☆19Aug 25, 2018Updated 7 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- A FUSE based steganographic file system☆27Mar 2, 2026Updated last month
- This repository contains source code for a game theory course.☆18May 21, 2017Updated 8 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- 从0开始写一个操作系统——《操作系统真象还原》☆12Sep 21, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Quick-start tutorial for specifying a new processor in ghidra☆14Nov 24, 2021Updated 4 years ago
- AKS Prime Test Python☆16Jul 27, 2020Updated 5 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- Script editor for Scripts.{rxdata, rvdata, rvdata2}☆10Oct 20, 2020Updated 5 years ago
- Cryptographic Key Generation from PUF Data☆23Oct 29, 2019Updated 6 years ago
- C++ Builder Fanuc Focas2 Example☆10Jul 25, 2018Updated 7 years ago
- Repository and website for the Estimate all the {LWE, NTRU} schemes! code and paper.☆25Aug 29, 2018Updated 7 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆23Oct 23, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆37Mar 3, 2026Updated last month
- ☆15Sep 26, 2021Updated 4 years ago
- OpenRISC 1000 processor module for IDA 7.x☆13Feb 13, 2024Updated 2 years ago
- ☆20Jul 16, 2024Updated last year
- ☆15Sep 5, 2024Updated last year
- minimum ELF64 program to calculate its own SHA256.☆18Aug 22, 2022Updated 3 years ago
- Some common reverse exps in CTF.自己总结编写的一些逆向常用脚本&&常见加密/编码的实现源码和比赛时用的处理脚本。☆34Jan 9, 2024Updated 2 years ago