cryptopals answers
☆23Oct 28, 2016Updated 9 years ago
Alternatives and similar repositories for cryptopals
Users that are interested in cryptopals are comparing it to the libraries listed below
Sorting:
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆34Aug 8, 2014Updated 11 years ago
- Working through the Matasano Crypto Challenges (cryptopals.com)☆36Oct 23, 2014Updated 11 years ago
- My solutions to Matasano Cryptopals challenge.☆30Nov 2, 2014Updated 11 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- Solutions to Matasano crypto challenges in Python 3.☆108May 29, 2023Updated 2 years ago
- OpenSSH 7.7 - Username Enumeration☆17Oct 23, 2020Updated 5 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead☆16Aug 2, 2015Updated 10 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- setup zeek, previously Bro IDS☆18Feb 5, 2026Updated 3 weeks ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- Shim to grab keystore backed data☆27Sep 21, 2017Updated 8 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Apr 1, 2023Updated 2 years ago
- Demo Application and Exploit☆35Mar 13, 2017Updated 8 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- Helvetica Themes for TaskPaper☆20Oct 30, 2011Updated 14 years ago
- Deterministic U2F token project☆10Oct 29, 2019Updated 6 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Analysing Reddit user data.☆12May 5, 2014Updated 11 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- iOS KEXT loader 7.x-9.x☆96Aug 13, 2017Updated 8 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 2 months ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- idaemu is an IDA Pro Plugin - use for emulating code in IDA Pro.☆42Feb 25, 2025Updated last year