ndiab / CRYPTOLinks
Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.
☆23Updated 7 years ago
Alternatives and similar repositories for CRYPTO
Users that are interested in CRYPTO are comparing it to the libraries listed below
Sorting:
- Repo for CSAW CTF 2018 Finals challenges☆56Updated 6 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 5 years ago
- Th3g3ntl3man CTF Writeups☆21Updated 6 years ago
- ☆49Updated 7 years ago
- Implementation of attacks on cryptosystems☆73Updated 4 years ago
- ☆25Updated 9 years ago
- Setup for a pwning VM☆61Updated 6 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- ☆90Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆89Updated 9 months ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆39Updated 7 years ago
- ☆12Updated 5 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- hax 'n shit☆119Updated 10 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Solutions for my 34C3CTF challenges☆21Updated 6 years ago
- Simulate afl-fuzz☆16Updated 5 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- ☆26Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- ☆28Updated 5 years ago
- Leak other players' temporary workspaces for ctf and wargames.☆86Updated 2 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Backwards program slice stitching for automatic CTF problem solving.☆52Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 6 years ago
- ☆82Updated 7 years ago
- Some RSA attacks with sage☆11Updated 8 years ago