Python library created while solving the Matasano Cryptopals challenges
☆17Jun 17, 2021Updated 4 years ago
Alternatives and similar repositories for cryptopal
Users that are interested in cryptopal are comparing it to the libraries listed below
Sorting:
- ☆14Jan 12, 2018Updated 8 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Apr 29, 2019Updated 6 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 11 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- 护网杯 2018 WEB (1) easy_tornado☆15Aug 22, 2019Updated 6 years ago
- Environment for CVE-2018-1273 (Spring Data Commons)☆10Aug 15, 2018Updated 7 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- A simple platform-agnostic chaos monkey☆12May 9, 2017Updated 8 years ago
- Demo: https://diafygi.github.io/myLock/☆16Jul 28, 2014Updated 11 years ago
- Universal Linux Application SDK - Create once. Run everywhere.☆10Jun 25, 2018Updated 7 years ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- Imports an LDAP file from Active Directory for SQL based offline reconnisance☆55Jun 1, 2016Updated 9 years ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Check a Windows PE file for some basic security flags☆12Jun 2, 2015Updated 10 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago