Python library created while solving the Matasano Cryptopals challenges
☆17Jun 17, 2021Updated 4 years ago
Alternatives and similar repositories for cryptopal
Users that are interested in cryptopal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 11 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- A plugin for Cutter that show the information about the assembly instruction currently selected .. only for x86 and x64☆17Apr 21, 2019Updated 7 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Apr 29, 2019Updated 7 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 12 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PowerShell Empire module for logging USB keystrokes via ETW☆31Nov 11, 2016Updated 9 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 6 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago
- Credentials recovery project☆11May 12, 2015Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- 护网杯 2018 WEB (1) easy_tornado☆15Aug 22, 2019Updated 6 years ago
- Environment for CVE-2018-1273 (Spring Data Commons)☆10Aug 15, 2018Updated 7 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- A simple platform-agnostic chaos monkey☆12May 9, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Demo: https://diafygi.github.io/myLock/☆16Jul 28, 2014Updated 11 years ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- notes and code on past CTFs☆105Jun 17, 2021Updated 4 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- AES implementation on FPGA☆13Apr 17, 2016Updated 10 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Using SEH to bypass CFG☆29Mar 28, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- "The most beautiful experience we can have is the mysterious. It is the fundamental emotion that stands at the cradle of true art and tru…☆21Jan 8, 2022Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Materials of Workshop presented at DEFCON 25☆107Jul 29, 2017Updated 8 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Tasks from CTFZone 2017 quals☆12Jul 19, 2017Updated 8 years ago
- ☆32Nov 15, 2017Updated 8 years ago