Python library created while solving the Matasano Cryptopals challenges
☆17Jun 17, 2021Updated 4 years ago
Alternatives and similar repositories for cryptopal
Users that are interested in cryptopal are comparing it to the libraries listed below
Sorting:
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Stochastic Traffic Factoring Utility☆15Nov 5, 2016Updated 9 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 11 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- The repository accompanying the Buer Emulation workshop☆23Aug 18, 2021Updated 4 years ago
- ☆24Feb 6, 2017Updated 9 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- ☆22Sep 27, 2017Updated 8 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- 어셈블리어를 배워서 써먹자☆21Jun 26, 2018Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- Materials of Workshop presented at DEFCON 25☆107Jul 29, 2017Updated 8 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- SQL Injection wargame☆25May 2, 2018Updated 7 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Copy and Paste standard library (CPSTL) is a repository with a collection of data structure and algorithms in many different languages☆13Feb 15, 2025Updated last year
- ☆10Oct 22, 2017Updated 8 years ago