Accompanying source code for examples from the book "Implementing and Exploiting Cryptography"
☆23Aug 30, 2024Updated last year
Alternatives and similar repositories for crypto-impl-exploit
Users that are interested in crypto-impl-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code Repository for the Building AI into your Web Apps book☆35Jan 7, 2026Updated 4 months ago
- Advanced Encryption Standard On-the-Fly mode in Julia☆13Aug 19, 2020Updated 5 years ago
- ☆11May 27, 2025Updated 11 months ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- ☆27Apr 18, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- hacking tools awesome lists☆17Jul 26, 2017Updated 8 years ago
- This is a LinkedIn Learning repo for Level Up: Rust.☆16Jul 18, 2024Updated last year
- ☆14Apr 4, 2023Updated 3 years ago
- Build distributed, low-latency services with a redis-compatible protocol and sentinel client support☆14Jan 24, 2018Updated 8 years ago
- Download and view npm package contents online☆18Apr 1, 2026Updated last month
- Simple intermediate representation language for learning and research.☆21Mar 27, 2020Updated 6 years ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 7 years ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated 4 months ago
- Elliptic curve mathematics including Tate and Weil pairings for BLS signatures and zk-SNARK algorithms.☆21Feb 24, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Using Demucs in comfyUI, make Music Source Separation☆12Dec 12, 2025Updated 5 months ago
- Docker based Bugzilla development environment☆11Nov 1, 2016Updated 9 years ago
- jackson-databind-exploit☆13Mar 22, 2019Updated 7 years ago
- R Bindings for htslib/bcf☆10Oct 4, 2023Updated 2 years ago
- Example AIDL service and client☆11Nov 30, 2021Updated 4 years ago
- Sample notebooks for Juno☆11Mar 1, 2025Updated last year
- tiktok tools | scrapping | automation☆33Nov 10, 2025Updated 6 months ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆11Dec 16, 2017Updated 8 years ago
- A set of scripts to facilitate HTTP interception on mobile apps☆23Mar 11, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Unpacker for donut shellcode☆22Jun 20, 2020Updated 5 years ago
- 华南师范大学Beamer模板☆15Nov 11, 2020Updated 5 years ago
- Learn Microsoft Office 2019, published by Packt☆12Jan 18, 2023Updated 3 years ago
- Lattices and Their Algorithms, Leiden, Spring 2024☆24Aug 13, 2024Updated last year
- Demo from the Malware Analysis and Development Webinar☆25Apr 17, 2024Updated 2 years ago
- Source code for 'Firewalls Don't Stop Dragons' by Carey Parker☆18Jan 15, 2023Updated 3 years ago
- Hands-On High Performance with Go, published by Packt☆14Jan 30, 2023Updated 3 years ago
- Convert GLSL from WebGL to OpenGL☆14Aug 12, 2020Updated 5 years ago
- Source code for Code Like a Pro in Rust☆143Jan 15, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Send packets to a RADIUS server and show reply☆18Mar 21, 2015Updated 11 years ago
- Blockchain for Enterprise, published by Packt☆13Jan 30, 2023Updated 3 years ago
- Mastering-JavaScript-Design-Patterns-Third-Edition☆13Jan 14, 2021Updated 5 years ago
- Source code for 'Beginning Adobe Animate CC' by TOM GREEN and Joseph Labrecque☆10May 18, 2018Updated 8 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆26Dec 19, 2023Updated 2 years ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Electron symbol server☆25May 13, 2026Updated last week