Cryptography and Network Security Lab programs done in 7th semester of SIT(VTU).
☆32Dec 22, 2019Updated 6 years ago
Alternatives and similar repositories for CNS-Lab
Users that are interested in CNS-Lab are comparing it to the libraries listed below
Sorting:
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- Homemade implementation of Square Attack against 4 rounds AES☆15Feb 2, 2020Updated 6 years ago
- Toolkit for creating cryptographic figures and videos.☆35May 17, 2024Updated last year
- Some crypto scripts which is useful in study and ctf☆29Sep 2, 2021Updated 4 years ago
- NCTF 2024 challenges and writeups☆10Apr 11, 2025Updated 11 months ago
- Node JS and Puppeteer Web Scraping☆10Jun 5, 2021Updated 4 years ago
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Feb 17, 2023Updated 3 years ago
- ☆21Feb 5, 2026Updated last month
- 该资源是作者收集各种类型CTF比赛的常用工具,包括Web、RE、Misc、Crypto、PWN、IOT等方向,非常适合安全初学者。希望对您有所帮助,也欢迎大家补充~☆13Aug 25, 2024Updated last year
- API client for Pritunl written in Ruby☆14May 4, 2016Updated 9 years ago
- A pure python tool to implement/exploit the hash length extension attack☆38Aug 14, 2023Updated 2 years ago
- An awesome list of gas optimization techniques for smart contracts, with their relevant Proof of Concepts tested using Foundry.☆16Mar 2, 2023Updated 3 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- ☆17Mar 27, 2025Updated 11 months ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆68Oct 15, 2019Updated 6 years ago
- A stop-loss liquidity pool to protect against directional risk.☆14Dec 8, 2023Updated 2 years ago
- MERN stack app uses Google passport authentication - Server.☆11Jul 20, 2018Updated 7 years ago
- Windows注册表取证分析工具☆19May 1, 2017Updated 8 years ago
- Repository for the paper titled "Attention-based Bi-LSTM for Anomaly Detection on Time-Series Data"☆22Apr 12, 2021Updated 4 years ago
- Purposed a network traffic classification and prediction model based on CNN, TCN and Attention mechanism.☆23Nov 13, 2023Updated 2 years ago
- MCP Server for Cutter☆21Aug 2, 2025Updated 7 months ago
- Git Action Slack Notifications From Build Status☆16May 26, 2022Updated 3 years ago
- An Adaptive Misuse Detection System☆46Nov 4, 2024Updated last year
- Computer Science PDF notes☆30Oct 21, 2025Updated 5 months ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Lab environment to accompany Boundary Vault Integration Quickstart Learn tutorial.☆22Nov 25, 2024Updated last year
- Implementing and summarizing interesting research papers in Machine Learning and Neural Network domain.☆19May 22, 2022Updated 3 years ago
- ☆21Sep 12, 2025Updated 6 months ago
- Functions for solving linear inequalities in integers☆60Jul 27, 2025Updated 7 months ago
- Work-in-progress tool to dump Swift types from a Mach-o☆12Sep 24, 2024Updated last year
- Interactive Editor/Debugger for testing Proxy Auto-Config files.☆17Apr 12, 2024Updated last year
- A real-time social media application with WebSocket for live messaging, allowing dynamic social interactions with data managed in MongoDB…☆21Dec 22, 2022Updated 3 years ago
- JADX-GUI plugin to get information about the native JNI (.so) libraries in an APK☆31Dec 15, 2025Updated 3 months ago
- A simplified pwntools for SageMath.☆11Dec 23, 2025Updated 2 months ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- ☆15Sep 2, 2024Updated last year
- My solutions for #Datalemur SQL Interview Questions☆28Sep 28, 2025Updated 5 months ago
- Honeyscanner: A vulnerability analyzer for honeypots☆62Jan 2, 2026Updated 2 months ago