igorvanloo / Project-Euler-ExplainedLinks
Project Euler Explained, codes used to solve Project Euler problems
☆14Updated 5 months ago
Alternatives and similar repositories for Project-Euler-Explained
Users that are interested in Project-Euler-Explained are comparing it to the libraries listed below
Sorting:
- Othello program created by Gunnar Andersson - This is a copy of the original code -☆16Updated 11 years ago
- Solutions to https://cryptopals.com problems☆28Updated 8 months ago
- ☆13Updated 2 years ago
- Introduction to Encryption☆12Updated 5 months ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 6 months ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- Web based binary analysis☆87Updated last year
- Network Traffic Fuzzer☆17Updated last year
- A Python3 Implementation of LLL☆36Updated 4 years ago
- ☆26Updated 4 years ago
- ☆18Updated 2 years ago
- A tool to perform so called BGE attack☆25Updated 6 months ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Tool for profiling heap usage and memory management☆27Updated 4 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆21Updated 11 months ago
- Original files from the puzzles, wiki pages, media coverage, old logs and more.☆28Updated 3 years ago
- Minimal setup to trigger the xz backdoor☆29Updated last year
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Updated last year
- Frontend for MalShare.com☆17Updated last week
- Some RSA attacks with sage☆11Updated 9 years ago
- Like Russian roulette, but for your kernel.☆14Updated 5 months ago
- DFF (Digital Forensics Framework)☆11Updated 4 years ago
- Vulnerabilities advisories and PoC☆18Updated last month
- Solutions to crackmes☆19Updated 10 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Updated 4 months ago
- ☆17Updated 9 years ago