☆10Aug 27, 2020Updated 5 years ago
Alternatives and similar repositories for Crypto_Paper
Users that are interested in Crypto_Paper are comparing it to the libraries listed below
Sorting:
- repo for ACTF 2020. Challenges, WPs, sources, etc.☆14Dec 9, 2020Updated 5 years ago
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Apr 8, 2020Updated 5 years ago
- Collections of all CTF challenges made by me.☆19Apr 14, 2024Updated last year
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- Record vulnerabilities and tricks found by me or my team.☆19Mar 31, 2021Updated 4 years ago
- ☆13Aug 25, 2018Updated 7 years ago
- Repo for colecting all my public CTF challenges☆28Dec 23, 2024Updated last year
- [CourseProject] 密码学:C语言实现DES和AES算法;Python实现RSA加密。Cryptography: DES and AES algorithms implemented with C; RSA implemented with Python.☆11Aug 25, 2023Updated 2 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- A hex/binary black box analysis tool☆13Aug 31, 2016Updated 9 years ago
- ☆26Mar 5, 2024Updated 2 years ago
- EncryptAndDecrypt , NDK之文件加密解密与分割合并☆21Aug 31, 2017Updated 8 years ago
- Deploy any Ethereum smart contract using its bytecode.☆22Nov 22, 2019Updated 6 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- ☆17Nov 2, 2022Updated 3 years ago
- JLU drcom client written in golang.☆12Sep 4, 2019Updated 6 years ago
- cheatsheets, dotfiles, scripts...☆18Dec 28, 2025Updated 2 months ago
- 帮助苦逼溯源人员快速分析和追踪可疑IP与域名。☆20Jan 14, 2025Updated last year
- ☆12Jul 18, 2022Updated 3 years ago
- Joway's Gallery☆10Nov 11, 2023Updated 2 years ago
- A simple golang reverse engineering ida plugin☆19Dec 16, 2020Updated 5 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- essentialist neural network transpiler for non-floating-point runtimes☆30Nov 7, 2022Updated 3 years ago
- ☆11Jun 28, 2020Updated 5 years ago
- ☆23Jul 18, 2023Updated 2 years ago
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- ☆14Sep 5, 2024Updated last year
- Some crypto tools I've written☆33May 18, 2015Updated 10 years ago
- Django storage for qcloud's COS☆13May 19, 2020Updated 5 years ago
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- ☆16Dec 4, 2021Updated 4 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- This is an industrial dataset contains eight different types of ICS protocols, mainly collected for the evaluation of protocol reverse en…☆17Jan 7, 2024Updated 2 years ago
- ☆12Mar 10, 2020Updated 6 years ago
- Optimizations for Pairing-Based Cryptography☆17Sep 10, 2021Updated 4 years ago
- nc 类题目的 Docker 容器资源限制、动态 flag、网页终端☆75Feb 14, 2026Updated last month