Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead
☆16Aug 2, 2015Updated 10 years ago
Alternatives and similar repositories for cryptopals-solutions
Users that are interested in cryptopals-solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆34Aug 8, 2014Updated 11 years ago
- CSAW CTF 2016 Finals☆13Dec 1, 2016Updated 9 years ago
- Deterministic U2F token project☆10Oct 29, 2019Updated 6 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Writeups and scripts for Pico CTF 2018☆12Dec 23, 2018Updated 7 years ago
- ☆12Feb 6, 2016Updated 10 years ago
- Scripts to manipulate HLS manifests at origin or edge server☆18Apr 19, 2017Updated 8 years ago
- Official website for Winter of Code☆11Dec 1, 2025Updated 3 months ago
- HTTP Request Translator (hrt) translates raw HTTP requests to different scripts (bash, python, etc.)☆17Feb 24, 2017Updated 9 years ago
- cryptopals answers☆23Oct 28, 2016Updated 9 years ago
- Solutions to Matasano crypto challenges in Python 3.☆108May 29, 2023Updated 2 years ago
- Analyst tool for creating pivot maps of data sources☆16Sep 11, 2017Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- My solutions and writeups for the CTF challenges hosted @ backdoor.sdslabs.co☆10Oct 23, 2017Updated 8 years ago
- CTF challenges from redpwnCTF 2019☆13Feb 17, 2020Updated 6 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- Nefit Easy™ client for Node.js☆15Feb 26, 2016Updated 10 years ago
- ☆44Updated this week
- Openwrt Running on VirtualBox with Vagrant☆22Aug 4, 2018Updated 7 years ago
- Simulations of Stop-and-Wait, Go-Back-N, Selective-Repeat☆27Sep 10, 2015Updated 10 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- It's one better☆11Jan 1, 2026Updated 2 months ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆13Mar 11, 2019Updated 7 years ago
- Security Tool to detect arp poisoning attacks☆54Apr 15, 2018Updated 7 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- Collection of AWS Lambda functions in Python☆11Mar 13, 2019Updated 7 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Python script for scraping product reviews☆14Dec 14, 2020Updated 5 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- dotPeek Console allows execution of C# code inside dotPeek. It supports dotPeek 1.0 and 1.1.☆20Feb 1, 2023Updated 3 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- OUSPG Open - Summer of Buzz with Fresh Blood, Alumni and Affiliates☆20Dec 2, 2016Updated 9 years ago
- Monster mesh is a mesh network with CB style radio app as a core component.☆21Apr 21, 2019Updated 6 years ago