My solutions to the Matasano Crypto Challenges. Written as a project for learning python.
☆34Aug 8, 2014Updated 11 years ago
Alternatives and similar repositories for cryptopals
Users that are interested in cryptopals are comparing it to the libraries listed below
Sorting:
- cryptopals answers☆23Oct 28, 2016Updated 9 years ago
- My solutions to Matasano Cryptopals challenge.☆30Nov 2, 2014Updated 11 years ago
- Solutions to Matasano crypto challenges in Python 3.☆108May 29, 2023Updated 2 years ago
- Working through the Matasano Crypto Challenges (cryptopals.com)☆36Oct 23, 2014Updated 11 years ago
- Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead☆16Aug 2, 2015Updated 10 years ago
- The Matasano crypto challenges completed using PHP☆25Sep 6, 2025Updated 5 months ago
- ☆23Nov 18, 2015Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- ☆26Jan 18, 2026Updated last month
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- CAs that are in the graph of trust☆13Oct 22, 2019Updated 6 years ago
- Some useful tools for all kinds of Embedded device.☆11Oct 12, 2015Updated 10 years ago
- Automate vulnerability triage which prioritizes remediation over discovery☆20Jan 19, 2026Updated last month
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Android app to bypass SSL certificate validation (Certificate Pinning).☆16Feb 7, 2016Updated 10 years ago
- Generic exploit for master key vulnerability in Android☆33Feb 6, 2015Updated 11 years ago
- Simple shellcode testing tool.☆49Feb 24, 2012Updated 14 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Linux hooking engine for ARM architecture☆16May 4, 2015Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated this week
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆34Dec 22, 2014Updated 11 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- A DOM-Inspired Ruby Smart Fuzzer☆57Apr 4, 2009Updated 16 years ago
- 使用SSDT HOOK 在windows上隐藏指定文件或者文件夹☆27Feb 24, 2021Updated 5 years ago
- mozilla: Firefox's X.509 certificate verification core code.☆22Oct 7, 2015Updated 10 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Jun 3, 2016Updated 9 years ago
- Diffing process heaps☆15Jul 23, 2022Updated 3 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago