Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆802Jun 17, 2025Updated 11 months ago
Alternatives and similar repositories for paranoid_crypto
Users that are interested in paranoid_crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆3,042May 12, 2026Updated last week
- Tool to find common vulnerabilities in cryptographic public keys☆321Apr 28, 2026Updated 3 weeks ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,484Jul 12, 2024Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,490Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆85Apr 13, 2022Updated 4 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,202Oct 6, 2025Updated 7 months ago
- ☆20Dec 13, 2019Updated 6 years ago
- Guidelines for low-level cryptography software☆1,213Jun 11, 2023Updated 2 years ago
- A collection of high-performance crypto implementations.☆53Nov 27, 2025Updated 5 months ago
- Crypto Audit Guidelines☆135Dec 28, 2020Updated 5 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆140Apr 17, 2023Updated 3 years ago
- Tool to start a python http server in a simple way☆11Mar 30, 2022Updated 4 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆19Sep 16, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆797Sep 30, 2022Updated 3 years ago
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,757Jan 2, 2026Updated 4 months ago
- My CTF tasks and writeup☆38Dec 6, 2022Updated 3 years ago
- OFRAK: unpack, modify, and repack binaries.☆2,048Updated this week
- Searcher for cross-site leaks (XS-Leaks)☆83Dec 27, 2022Updated 3 years ago
- Please see https://github.com/hacspec/hax☆246Feb 12, 2024Updated 2 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102May 13, 2022Updated 4 years ago
- Elastic Security detection content for Endpoint☆1,429May 11, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆38Jul 8, 2023Updated 2 years ago
- ☆12Sep 23, 2021Updated 4 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆143Jun 18, 2025Updated 11 months ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated 2 years ago
- List of unsafe ed25519 signature libs☆248Oct 29, 2023Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,113Dec 11, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆813Apr 12, 2026Updated last month
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆1,506Jul 22, 2022Updated 3 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- ☆116Feb 11, 2026Updated 3 months ago
- A static analyzer and linter for the Circom zero-knowledge DSL☆263Jun 22, 2024Updated last year
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆401Mar 27, 2026Updated last month
- A plugin to introduce interactive symbols into your debugger from your decompiler☆799Apr 29, 2026Updated 3 weeks ago