Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆800Jun 17, 2025Updated 9 months ago
Alternatives and similar repositories for paranoid_crypto
Users that are interested in paranoid_crypto are comparing it to the libraries listed below
Sorting:
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- Tool to find common vulnerabilities in cryptographic public keys☆313Feb 18, 2026Updated last month
- Project Wycheproof tests crypto libraries against known attacks.☆3,000Mar 11, 2026Updated last week
- ☆20Dec 13, 2019Updated 6 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,482Jul 12, 2024Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,390Updated this week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 3 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,202Oct 6, 2025Updated 5 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Apr 17, 2023Updated 2 years ago
- Guidelines for low-level cryptography software☆1,200Jun 11, 2023Updated 2 years ago
- A collection of high-performance crypto implementations.☆53Nov 27, 2025Updated 3 months ago
- Crypto Audit Guidelines☆135Dec 28, 2020Updated 5 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Sep 16, 2025Updated 6 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆797Sep 30, 2022Updated 3 years ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,737Jan 2, 2026Updated 2 months ago
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- My CTF tasks and writeup☆38Dec 6, 2022Updated 3 years ago
- Searcher for cross-site leaks (XS-Leaks)☆81Dec 27, 2022Updated 3 years ago
- Please see https://github.com/hacspec/hax☆246Feb 12, 2024Updated 2 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- Elastic Security detection content for Endpoint☆1,389Updated this week
- OFRAK: unpack, modify, and repack binaries.☆2,029Updated this week
- Seer is a tool that recognizes the architecture of a binary file☆102May 13, 2022Updated 3 years ago
- ☆38Jul 8, 2023Updated 2 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆134Jun 18, 2025Updated 9 months ago
- ☆12Sep 23, 2021Updated 4 years ago
- ☆1,505Jul 22, 2022Updated 3 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,077Dec 11, 2024Updated last year
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- A collection of my Semgrep rules to facilitate vulnerability research.☆799Mar 9, 2026Updated last week
- ☆12Jun 22, 2022Updated 3 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- ☆117Feb 11, 2026Updated last month
- A static analyzer and linter for the Circom zero-knowledge DSL☆261Jun 22, 2024Updated last year
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Testing Schnorr's factorization claim in Sage☆304Aug 29, 2022Updated 3 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆388Jan 25, 2026Updated last month
- Credentials Dumper for Linux using eBPF☆1,157Sep 9, 2024Updated last year