jaybosamiya / DiffieHellman-ManInTheMiddleLinks
Demonstrating a practical attack on the Diffie Hellman Key Exchange protocol, through breaking a secure chat system
☆14Updated 9 years ago
Alternatives and similar repositories for DiffieHellman-ManInTheMiddle
Users that are interested in DiffieHellman-ManInTheMiddle are comparing it to the libraries listed below
Sorting:
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 10 years ago
- Experiments in trying to find 0-days in numpy☆38Updated 8 years ago
- ☆19Updated 9 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆68Updated 7 years ago
- Writeups for different CTF challenges☆70Updated 5 months ago
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- ☆21Updated 3 years ago
- ☆16Updated 7 years ago
- Cracking real-world Crypto, the fun way☆19Updated 8 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆168Updated 7 years ago
- ☆89Updated last year
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Writeups and solutions for RC3CTF 2016☆14Updated 8 years ago
- quals-2014☆21Updated 10 years ago
- ☆33Updated 8 years ago
- Security Tool to detect arp poisoning attacks☆55Updated 7 years ago
- Fuzzing results for various interpreters.☆82Updated 7 years ago
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- various CTF writeups☆60Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- A demangler package for gcc 3.x and gcc 4.x☆11Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Basic Hybrid Kernal with minimal features interrupt handling, command line interface☆16Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆26Updated 7 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆37Updated 9 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 9 years ago
- hax 'n shit☆120Updated 10 years ago