ndiab / CRYPTOLinks
Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.
☆24Updated 7 years ago
Alternatives and similar repositories for CRYPTO
Users that are interested in CRYPTO are comparing it to the libraries listed below
Sorting:
- ☆12Updated 6 years ago
- CTF writeups☆114Updated 8 years ago
- 🏴 Collection of CTF solutions☆74Updated 6 years ago
- ☆49Updated 7 years ago
- X41 Smartcard Fuzzer☆120Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- GUI tool to create ROP chains using the ropper API☆159Updated 7 years ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆37Updated 8 years ago
- Stuff from CTF contests☆39Updated 6 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- ☆16Updated 7 years ago
- ☆92Updated last year
- Repo for CSAW CTF 2018 Finals challenges☆55Updated 7 years ago
- Implementation of attacks on cryptosystems☆75Updated 6 months ago
- ☆24Updated 10 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- Useful crypto tools for CTF☆40Updated 3 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Updated 7 years ago
- ☆20Updated 6 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆78Updated 6 years ago
- Solutions to the security/cryptography problems at https://id0-rsa.pub☆20Updated 8 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- ☆81Updated 8 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆26Updated 8 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Updated 7 years ago
- ☆41Updated 8 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆149Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- Cracking 2DES using a meet-in-the-middle attack implemented in python 3.☆15Updated 10 years ago