Solutions to the Matasano Crypto Challenges
☆16Jun 1, 2021Updated 4 years ago
Alternatives and similar repositories for cryptopals
Users that are interested in cryptopals are comparing it to the libraries listed below
Sorting:
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- 华东师范大学共享课程计划 Sharing Courses with ECNUers☆37Feb 7, 2026Updated 3 weeks ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- A Dalamud plugin for FFXIV/FF14.☆35Dec 24, 2025Updated 2 months ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- 💎 Virtual crypto exchange for testing purposes. API is compatible with major crypto exchanges.☆12Feb 14, 2019Updated 7 years ago
- MPU-6050 Accelerometer and Gyroscope code☆11Aug 4, 2014Updated 11 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- ☆11Aug 21, 2017Updated 8 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Create a netfilter queue and display packets passing through. Can also save those packets to a pcap file.☆13Dec 3, 2011Updated 14 years ago
- ☆10Apr 26, 2020Updated 5 years ago
- ☆11Sep 15, 2015Updated 10 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A proxy for reverse engineering a communication protocol☆10Jan 17, 2021Updated 5 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- bash-based certificate authority, with CA-cert, signing-cert, and revocation support.☆10Oct 8, 2021Updated 4 years ago
- A GUI application for managing Solo v2 security keys☆11Updated this week
- ☆12Feb 24, 2023Updated 3 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- ☆11Sep 3, 2020Updated 5 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Random one-offs that need a temporary home☆12Jan 28, 2026Updated last month
- A blockchain simulator based on SimPy in python.☆14Dec 18, 2018Updated 7 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- This is a TensorFlow implementation of DeepMind's A Distributional Perspective on Reinforcement Learning.(C51-DDPG)☆11Sep 14, 2017Updated 8 years ago
- The Ambire AdEx Validator Stack implemented in Rust: sentry, validator worker, adapter, adview manager☆11Mar 25, 2023Updated 2 years ago
- ☆11Jun 18, 2020Updated 5 years ago
- A simulation showcasing federated learning with homomorphic encryption☆10Sep 24, 2023Updated 2 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- ☆12Sep 8, 2017Updated 8 years ago
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago