keybase / python-twofishLinks
Bindings for the Twofish implementation by Niels Ferguson
☆27Updated 3 years ago
Alternatives and similar repositories for python-twofish
Users that are interested in python-twofish are comparing it to the libraries listed below
Sorting:
- A python implementation of the block cipher RC4☆41Updated 8 years ago
- Python implementation of FIPS SHA3 and SHAKE☆45Updated 7 years ago
- rc4 java c++ python php☆86Updated 3 years ago
- Basic implementation of Blake2 in C as a base for Argon2 for Mozilla's Network Security Services.☆11Updated 9 years ago
- Python OpenSSL wrapper. For modern cryptography with ECC, AES, HMAC, Blowfish, ...☆133Updated 8 years ago
- a simple encrypted sock5 proxy for skip the GFW☆33Updated 6 years ago
- prototype of whitebox AES in C . Luo,Lai,You☆21Updated 9 years ago
- pure python tls 1.3 implementation☆42Updated 5 years ago
- C implementation of SHA3 (Keccak)☆21Updated 4 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- send dns query packet☆26Updated 4 years ago
- A Linux rootkit☆10Updated 7 years ago
- DES algorithm implementation in C☆79Updated 5 years ago
- RSA 2048 encryption using CryptoAPI and C☆36Updated 9 years ago
- SECCURE compatible Elliptic Curve cryptography in Python☆94Updated 6 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- Implementation for Chinese National Standard Ciphers☆43Updated 12 years ago
- GNU Crypto library☆36Updated 14 years ago
- A ptrace based sandbox. (PoC)☆14Updated 7 years ago
- Fast software implementation in C of the FIPS 180-2 hash algorithms SHA-224, SHA-256, SHA-384 and SHA-512☆59Updated last year
- PyCryptoPlus: a pycrypto extension written 100% in Python☆76Updated 9 years ago
- Using GNU lightning to generate xor deobfuscation at runtime☆28Updated 8 years ago
- hook: linux kernel syscall hijack☆21Updated 9 years ago
- slide☆13Updated 8 years ago
- Documents and whitepapers☆12Updated 9 years ago
- Whitebox implementation of AES and ARIA.☆32Updated 5 years ago
- eyuyan image rebuild tools source code☆13Updated 9 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Updated 8 years ago
- Attempt for a cross platform AES-GCM encryption☆43Updated 5 years ago
- blocking socket library with SSL, SOCKS/HTTP proxy chaining, and timeout☆41Updated 3 years ago