My solutions to the Matasano Crypto Challenges. Written as a project for learning python.
☆34Aug 8, 2014Updated 11 years ago
Alternatives and similar repositories for cryptopals
Users that are interested in cryptopals are comparing it to the libraries listed below
Sorting:
- cryptopals answers☆23Oct 28, 2016Updated 9 years ago
- My solutions to Matasano Cryptopals challenge.☆30Nov 2, 2014Updated 11 years ago
- Working through the Matasano Crypto Challenges (cryptopals.com)☆36Oct 23, 2014Updated 11 years ago
- The Matasano crypto challenges completed using PHP☆25Sep 6, 2025Updated 6 months ago
- mozilla: Firefox's X.509 certificate verification core code.☆21Oct 7, 2015Updated 10 years ago
- ☆23Nov 18, 2015Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Jun 3, 2016Updated 9 years ago
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 7 years ago
- BinaryView Plugin for Microcorruption CTF memory dumps☆13Jul 16, 2019Updated 6 years ago
- CAs that are in the graph of trust☆13Oct 22, 2019Updated 6 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- ☆14Nov 21, 2022Updated 3 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- misc analysis script for hqx (hq2x hq3x hq4x) algorithms☆19Jun 21, 2014Updated 11 years ago
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- Simple shellcode testing tool.☆49Feb 24, 2012Updated 14 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago
- ☆26Jan 18, 2026Updated 2 months ago
- A Perceptron from scratch in JavaScript☆10May 4, 2025Updated 10 months ago
- Some useful tools for all kinds of Embedded device.☆11Oct 12, 2015Updated 10 years ago
- Hacking Games in a Hacked Game☆29Apr 20, 2015Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- 使用SSDT HOOK 在windows上隐藏指定文件或者文件夹☆27Feb 24, 2021Updated 5 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- All-in-one tool for Akamai site shield security group management☆16May 22, 2023Updated 2 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Burp Extension to manipulate AES encrypted payloads☆24Aug 2, 2017Updated 8 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- Android app to bypass SSL certificate validation (Certificate Pinning).☆16Feb 7, 2016Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.