Kudelski Security's 2018 pre-Black Hat crypto challenge
☆36Aug 27, 2018Updated 7 years ago
Alternatives and similar repositories for cryptochallenge18
Users that are interested in cryptochallenge18 are comparing it to the libraries listed below
Sorting:
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- ☆15May 23, 2019Updated 6 years ago
- TV show scraper/renamer thingy☆12May 10, 2013Updated 12 years ago
- ☆28Jun 28, 2019Updated 6 years ago
- Check a Windows PE file for some basic security flags☆12Jun 2, 2015Updated 10 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆14Jul 8, 2019Updated 6 years ago
- Holding place for my security and threat news RSS list☆15Jan 13, 2025Updated last year
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- Random collection of zero-knowledge stuff☆15May 20, 2018Updated 7 years ago
- ☆25Dec 4, 2022Updated 3 years ago
- ☆17Aug 26, 2025Updated 6 months ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆18Apr 12, 2015Updated 10 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- Smart buffer closing. Mirror of repo by Orphée Lafond-Lummis.☆17Apr 22, 2013Updated 12 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- Writeups for past CTFs I've joined☆18Jun 1, 2021Updated 4 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆94Oct 19, 2020Updated 5 years ago
- A TypeScript penumbra SDK☆18Aug 4, 2022Updated 3 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Jan 8, 2019Updated 7 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- CoSi command line interface☆21Jan 23, 2017Updated 9 years ago
- ☆23Nov 18, 2015Updated 10 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- Code samples that correctly check the remote server's SSL certificate☆24Feb 22, 2016Updated 10 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Java importer skeleton for complicated, business-logic-heavy high-performance Neo4j imports directly from SQL databases, CSV files, etc.☆26Apr 30, 2017Updated 8 years ago
- Security advisories by SBA Research.☆26Jan 7, 2026Updated last month
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- 33C3 CTF binary challenge☆27Jan 6, 2017Updated 9 years ago