☆10Aug 27, 2020Updated 5 years ago
Alternatives and similar repositories for Crypto_Paper
Users that are interested in Crypto_Paper are comparing it to the libraries listed below
Sorting:
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Apr 8, 2020Updated 5 years ago
- repo for ACTF 2020. Challenges, WPs, sources, etc.☆14Dec 9, 2020Updated 5 years ago
- Collections of all CTF challenges made by me.☆19Apr 14, 2024Updated last year
- Record vulnerabilities and tricks found by me or my team.☆19Mar 31, 2021Updated 4 years ago
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- [CourseProject] 密码学:C语言实现DES和AES算法;Python实现RSA加密。Cryptography: DES and AES algorithms implemented with C; RSA implemented with Python.☆11Aug 25, 2023Updated 2 years ago
- Repo for colecting all my public CTF challenges☆28Dec 23, 2024Updated last year
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- ☆14May 20, 2019Updated 6 years ago
- 利用QT编写一个QQ聊天程序☆10Jun 1, 2021Updated 4 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- ☆11Aug 25, 2018Updated 7 years ago
- JavaWeb实现的优优图书商城☆10Aug 8, 2014Updated 11 years ago
- SolarWinds Orion API 远程代码执行漏洞批量检测脚本☆10Jan 5, 2021Updated 5 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- JLU drcom client written in golang.☆12Sep 4, 2019Updated 6 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- 人事管理系统使用了SSM控件,使用Maven进行依赖包控制。☆13Dec 16, 2022Updated 3 years ago
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Inject libraries into 32 processes on macOS Mojave☆16Mar 2, 2020Updated 6 years ago
- Joway's Gallery☆10Nov 11, 2023Updated 2 years ago
- Exp of cve-2019-12272☆20Jul 10, 2019Updated 6 years ago
- ASUSWRT Source Code (RT-AC68U)☆12Oct 24, 2015Updated 10 years ago
- ☆16Dec 4, 2021Updated 4 years ago
- This is an industrial dataset contains eight different types of ICS protocols, mainly collected for the evaluation of protocol reverse en…☆16Jan 7, 2024Updated 2 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- ☆13Sep 5, 2024Updated last year