ctz / cryptopals
cryptopals answers
☆24Updated 7 years ago
Related projects: ⓘ
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆35Updated 10 years ago
- Vagrant files to bootstrap VM for CTFs☆10Updated 8 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- free crypto audit☆31Updated 7 years ago
- ☆18Updated this week
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 8 years ago
- Working through the Matasano Crypto Challenges (cryptopals.com)☆35Updated 9 years ago
- My solutions to Matasano Cryptopals challenge.☆30Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 7 years ago
- Tools for attacking cryptographic implementations.☆21Updated 7 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- ☆25Updated this week
- Reverse Engineering and Exploit Development stuff☆30Updated 6 years ago
- Practice and learning in the world of C RE and exploit analysis☆31Updated 6 years ago
- Write Up I write for different CTFs☆12Updated 6 years ago
- A simple steganalysis script writen in Python☆25Updated 10 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 3 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 7 years ago
- Tools for timing attacks☆18Updated 8 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 6 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- Repository for Insomni'hack finals 2015☆23Updated 9 years ago
- ☆26Updated 8 years ago
- ☆26Updated this week
- Sample application to let OpenSSL talk to itself (for fuzzing)☆33Updated 8 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 9 years ago