chavaone / coursera-crypto-scriptsLinks
Coursera Cryptography Course Scripts
☆16Updated 12 years ago
Alternatives and similar repositories for coursera-crypto-scripts
Users that are interested in coursera-crypto-scripts are comparing it to the libraries listed below
Sorting:
- My solutions and explanations of the http://cryptopals.com/ challenges.☆26Updated 4 years ago
- Crypto ransomware detection & prevention☆19Updated 9 years ago
- ☆11Updated 5 years ago
- Tools and utilities needed to parse GitHub Multi-Repository Variant Analysis output☆21Updated last month
- Solutions for the Matasano Crypto Challenges☆23Updated 6 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Updated 3 years ago
- An implementation of RFC 7515-18 using Cryptography☆14Updated 3 months ago
- The SAF Training Lab is a GitHub Codespaces environment that makes it quick and easy for you to use, learn and participate in the MITRE S…☆14Updated 5 months ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- Some crypto tools I've written☆31Updated 10 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- PyCryptoPlus: a pycrypto extension written 100% in Python☆75Updated 8 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Updated 13 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆32Updated 5 years ago
- SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions☆39Updated 2 years ago
- Detect and prevent crypto malware as it encrypts files☆69Updated 3 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated 2 years ago
- Coursera Stanford Cryptography 1☆75Updated 11 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Yet another Crypto-PAn implementation for Python☆30Updated 2 years ago
- Fizzer is an assessment tool for fuzzing FIX messages.☆29Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- Writeups to Crypto Challenges in CTFs☆40Updated 6 years ago
- Flash Player Bitcoin Miner☆26Updated 12 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.☆23Updated 7 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆29Updated 7 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆38Updated 5 years ago