mjm918 / python-AES-encryption-socket-secure-chatLinks
☆13Updated last week
Alternatives and similar repositories for python-AES-encryption-socket-secure-chat
Users that are interested in python-AES-encryption-socket-secure-chat are comparing it to the libraries listed below
Sorting:
- A simple C keylogger for Linux☆70Updated 5 years ago
- A pure Python implementation of AES☆206Updated 5 years ago
- ☆26Updated 4 years ago
- Reverse Engineering☆46Updated 9 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Updated 11 years ago
- Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. …☆46Updated 12 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆78Updated 6 years ago
- ☆22Updated 11 years ago
- Source code to the Reverse Engineering Challenges for the CSAW 2009 competition, as well as the "scoreboard" system.☆32Updated 16 years ago
- This is an example buffer overflow attack on a small vulnerable C program.☆80Updated 9 years ago
- Collection of Linux shellcodes☆72Updated 9 years ago
- SLAE Assignments☆39Updated last year
- ☆59Updated 11 years ago
- this is the source code of the stuxnet virus only for educational purpose or malware analysic☆72Updated 9 years ago
- Collection of articles about realmode 16bit assembly☆67Updated 2 years ago
- Sample c network programming☆94Updated 7 years ago
- Operating systems playground.☆16Updated 6 years ago
- a fork of a very cool, but dormant, project at http://www.eresi-project.org/☆21Updated 13 years ago
- Calcium OS project for x86_64☆40Updated 8 years ago
- A Chat Server/Client with built-in RSA encryption written in Python☆10Updated 13 years ago
- Understanding Linux Kernel Vulnerability☆23Updated 8 years ago
- Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.☆24Updated 7 years ago
- ☆22Updated 9 years ago
- A collection of tools for overwriting the MBR (Master Boot Record) of a machine with another file.☆20Updated 11 years ago
- ARP Man-in-the-Middle tool☆31Updated last year
- Challenges for INShAck☆20Updated 8 years ago
- Th3g3ntl3man CTF Writeups☆22Updated 7 years ago
- Solutions for Exploit-Exercises Protostar☆75Updated 11 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆78Updated 6 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Updated 8 years ago