A small SSH server written in Go that checks for weak SSH keys
☆13Feb 26, 2016Updated 10 years ago
Alternatives and similar repositories for sshkeycheck
Users that are interested in sshkeycheck are comparing it to the libraries listed below
Sorting:
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 4 months ago
- ☆30Oct 26, 2011Updated 14 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Universal disassembler for Python bytecode (supports Python 2 and 3)☆52Oct 18, 2011Updated 14 years ago
- ☆12Aug 24, 2014Updated 11 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Scripts for running Apache Kafka on Mesosphere's Marathon☆14Dec 6, 2015Updated 10 years ago
- GLPK, but it's Python.☆14Sep 3, 2024Updated last year
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Uses a genetic algorithm to "evolve" brainfuck programs with desirable behaviours☆11Feb 8, 2025Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Firmware for Xilinx Platform Cable 1 USB Jtag adapter☆10Jul 24, 2016Updated 9 years ago
- Benchmarks to compare golang geohash implementations☆12Aug 6, 2018Updated 7 years ago
- [DEPRECATED] Butterfly is a C library that implements a very simple 'dynamic' data-type. It could be used, for example, to manipulate JSO…☆15Apr 11, 2011Updated 14 years ago
- ☆10Jun 22, 2025Updated 8 months ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- 👾 research on robotics, computational graphics, and 3D photography☆13Oct 15, 2024Updated last year
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Sidekiq-style background jobs in Go☆60Apr 19, 2014Updated 11 years ago
- move messages from one maildir to another☆12Sep 1, 2024Updated last year
- A transducer library for Rust☆10May 22, 2016Updated 9 years ago
- Regular expression matching in Idris☆11Apr 27, 2016Updated 9 years ago
- Playing with golang☆11Mar 7, 2016Updated 9 years ago
- A simple library for querying the AST of a Go program☆11Feb 10, 2015Updated 11 years ago
- ☆11Sep 25, 2014Updated 11 years ago
- AWS ssm parameter store as keystore service☆10Aug 20, 2018Updated 7 years ago
- Collection of algorithms and data structures optimized for competitive programming☆10Mar 24, 2025Updated 11 months ago
- A set of utilities for working with MongoDB logs. Imported directly by the Honeycomb agent, honeytail☆13Dec 19, 2022Updated 3 years ago
- fsharp implementation of bull.js redis queue☆14Jun 1, 2018Updated 7 years ago
- Redis GET, SET, DEL, PUBLISH and SUBSCRIBE commands on top of riak_core☆29Jan 20, 2018Updated 8 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago