kudelskisecurity / cryptochallenge17View external linksLinks
Kudelski Security's 2017 crypto challenge
☆20Jul 6, 2017Updated 8 years ago
Alternatives and similar repositories for cryptochallenge17
Users that are interested in cryptochallenge17 are comparing it to the libraries listed below
Sorting:
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- ☆13Jun 9, 2020Updated 5 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Small scripts to simplify network communication☆27Dec 27, 2020Updated 5 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- ☆113Oct 17, 2017Updated 8 years ago
- LeapMotion controller for Philips Hue light system - use your hands to control the color & brightness☆10Aug 8, 2015Updated 10 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Updated this week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- A proof-of-stake based crypto currency☆13Mar 6, 2024Updated last year
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- Bloomberg module for the Perl Finance::Quote module (used in particular by GnuCash)☆13Jun 2, 2021Updated 4 years ago
- Simple, beautiful discussion forums - for customer support, news aggregation, QA sites, and online communities.☆56Dec 9, 2012Updated 13 years ago
- Material do Grupo de Estudos em Ciência de Dados☆13Jan 25, 2021Updated 5 years ago
- Complex multiplication based factorization☆40Feb 21, 2022Updated 3 years ago
- Brutally optimizing guess-and-determine attacks https://www.usenix.org/conference/woot18/presentation/verstegen☆45Aug 13, 2018Updated 7 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- ☆15Updated this week
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- A Python interface to the Earthworm Seismic Data System.☆13Oct 4, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- Bot to anonymously send E2EE messages over Signal to a subscriber list.☆11Updated this week
- CEX.IO API integration. PHP sources.☆21Oct 16, 2017Updated 8 years ago
- Sage implementation of the MAYO scheme☆14Feb 3, 2025Updated last year
- A bot that help you easily request money from friends.☆10Dec 6, 2016Updated 9 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Jan 11, 2025Updated last year
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- nuke7plugin☆18May 21, 2013Updated 12 years ago
- repo do Diego☆10Nov 7, 2023Updated 2 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆30Jan 13, 2026Updated last month
- Python Library for Function Approximation in Machine Learning☆12Nov 5, 2019Updated 6 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year