sagi / code_for_blogLinks
Code for blog entries.
☆23Updated 8 years ago
Alternatives and similar repositories for code_for_blog
Users that are interested in code_for_blog are comparing it to the libraries listed below
Sorting:
- Just a simple radare2 Jupyter kernel☆110Updated 8 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- ☆29Updated last week
- Solutions for the Matasano Crypto Challenges☆24Updated 7 years ago
- An analysis of historical Hacker News data to determine the ranking algorithm☆85Updated 8 years ago
- Factoring as a Service☆275Updated 7 months ago
- My little fuzzing framework inspired by grinder☆100Updated 8 years ago
- A tool for predicting the output of random number generators☆193Updated 8 years ago
- The Z3 Theorem Prover - repository for staging python distributions☆52Updated 6 years ago
- ☆170Updated 4 years ago
- TLS Library in python☆237Updated 3 years ago
- ☆65Updated 5 years ago
- Binary data diffing for multiple objects or streams of data☆309Updated 2 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Updated 10 years ago
- bringing sanity to world of messed-up data☆33Updated 2 years ago
- ☆89Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- misc stuff☆19Updated 8 years ago
- free crypto audit☆31Updated 8 years ago
- A cryptographic method that defends against side-channel attacks☆25Updated 9 years ago
- Open source software for image correlation, distance and analysis☆61Updated 2 years ago
- TLS - what can go wrong?☆108Updated 3 weeks ago
- Implementations of the Simon and Speck Block Ciphers☆101Updated 7 years ago
- #7DaysOfCode Challenge. Next step #100DaysOfCode☆11Updated 8 years ago
- A Gamma muxing tool☆55Updated 6 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆442Updated last year
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 10 years ago