keithjjones / pycryptotools
A set of Python tools useful for cryptography and cryptanalysis.
☆15Updated 8 years ago
Alternatives and similar repositories for pycryptotools:
Users that are interested in pycryptotools are comparing it to the libraries listed below
- Cryptanalysis and attack library☆22Updated 3 years ago
- Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur☆18Updated 2 years ago
- Open YARA scan- and search engine☆22Updated last month
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- ☆19Updated 11 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- ☆22Updated 4 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆17Updated 4 years ago
- Economics of Ransomware | Dataset☆15Updated 6 years ago
- buffer overflow exploits for simple c programs (64 bit)☆15Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- ☆14Updated 7 years ago
- Quick and dirty script to parse bplists with Ruby☆12Updated 4 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- THP Forensic Challenges☆21Updated last year
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆17Updated 3 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 8 years ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆27Updated 6 years ago
- WiP - cve-search next gen☆13Updated 5 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 2 months ago
- A scanner of the "World's Scariest" scanner☆17Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- A Linux Kernel that can be booted on GoPro Hero2/Hero3 cameras☆29Updated 8 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Disassembly Generation and Processing for JARV1S☆14Updated 8 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago