My solutions to the Matasano Crypto Challenges. Written as a project for learning python.
☆34Aug 8, 2014Updated 11 years ago
Alternatives and similar repositories for cryptopals
Users that are interested in cryptopals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cryptopals answers☆23Oct 28, 2016Updated 9 years ago
- Solutions to Matasano crypto challenges in Python 3.☆108May 29, 2023Updated 2 years ago
- Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead☆16Aug 2, 2015Updated 10 years ago
- My solutions to Matasano Cryptopals challenge.☆30Nov 2, 2014Updated 11 years ago
- Working through the Matasano Crypto Challenges (cryptopals.com)☆36Oct 23, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- mozilla: Firefox's X.509 certificate verification core code.☆21Oct 7, 2015Updated 10 years ago
- ☆23Nov 18, 2015Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Jun 3, 2016Updated 9 years ago
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago
- BinaryView Plugin for Microcorruption CTF memory dumps☆13Jul 16, 2019Updated 6 years ago
- CAs that are in the graph of trust☆13Oct 22, 2019Updated 6 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- ☆16Mar 27, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- The Matasano Crypto Challenges in Rust http://cryptopals.com/☆11Nov 5, 2015Updated 10 years ago
- Decree Fiat Shamir Library☆12Mar 27, 2024Updated 2 years ago
- A development version of the numerically exact variant of MIP solver SCIP☆11Mar 22, 2023Updated 3 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- misc analysis script for hqx (hq2x hq3x hq4x) algorithms☆19Jun 21, 2014Updated 11 years ago
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple shellcode testing tool.☆49Feb 24, 2012Updated 14 years ago
- A standalone elliptic curve/AES file encryption and decryption device☆17Jun 28, 2023Updated 2 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 9 years ago
- ☆26Jan 18, 2026Updated 3 months ago
- Some useful tools for all kinds of Embedded device.☆11Oct 12, 2015Updated 10 years ago
- Hacking Games in a Hacked Game☆29Apr 20, 2015Updated 11 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆10Dec 21, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- secp256k1 ECDSA benchmarks (k256 vs libsecp256k1 vs rust-secp256k1)☆16May 31, 2022Updated 3 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 9 years ago
- Burp Extension to manipulate AES encrypted payloads☆24Aug 2, 2017Updated 8 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 11 years ago
- Android app to bypass SSL certificate validation (Certificate Pinning).☆16Feb 7, 2016Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago