ctz / cryptopalsLinks
cryptopals answers
☆23Updated 9 years ago
Alternatives and similar repositories for cryptopals
Users that are interested in cryptopals are comparing it to the libraries listed below
Sorting:
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆34Updated 11 years ago
- Vagrant files to bootstrap VM for CTFs☆11Updated 9 years ago
- My solutions to Matasano Cryptopals challenge.☆30Updated 11 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 9 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- CTF & practice exploit collection☆38Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- Write Up I write for different CTFs☆12Updated 8 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- lte security☆42Updated 10 years ago
- quals-2014☆21Updated 11 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago
- ☆13Updated 9 years ago
- ☆12Updated 9 years ago
- A DOM-Inspired Ruby Smart Fuzzer☆56Updated 16 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Updated 11 years ago
- Various tools, exploits and other short code snippets☆12Updated 6 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- crack text files encrypted with vim's :X command☆22Updated 9 years ago