jaybosamiya / cryptopals-solutionsLinks
Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead
☆16Updated 10 years ago
Alternatives and similar repositories for cryptopals-solutions
Users that are interested in cryptopals-solutions are comparing it to the libraries listed below
Sorting:
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆34Updated 11 years ago
- Simple shellcode testing tool.☆49Updated 13 years ago
- CSAW CTF 2016 Finals☆13Updated 9 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 10 years ago
- ☆16Updated 7 years ago
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- PoC for CVE-2015-6086☆67Updated 9 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- Source for some problems from PlaidCTF 2014.☆59Updated 11 years ago
- ☆10Updated 2 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆26Updated 8 years ago
- ☆81Updated 8 years ago
- Collection of software bugs found by SkyLined☆68Updated 9 years ago
- Write ups☆16Updated 8 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆52Updated 8 years ago
- ☆21Updated 4 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- Exploits for interesting CTF challenges I have worked on☆63Updated 8 years ago
- ☆92Updated last year
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 9 years ago
- CTF(x) 2016 problem statements, files, and writeups☆16Updated 7 years ago
- CTF Finals☆17Updated 8 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆68Updated 8 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 10 years ago
- Experiments in trying to find 0-days in numpy☆38Updated 8 years ago
- ☆77Updated 10 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆37Updated 9 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago