sagi / code_for_blog
Code for blog entries.
☆23Updated 7 years ago
Alternatives and similar repositories for code_for_blog:
Users that are interested in code_for_blog are comparing it to the libraries listed below
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- Just a simple radare2 Jupyter kernel☆110Updated 7 years ago
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆78Updated 8 years ago
- The Z3 Theorem Prover - repository for staging python distributions☆56Updated 5 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- ☆170Updated 4 years ago
- New TLS Padding Oracles☆125Updated last year
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- Solutions for the Matasano Crypto Challenges☆22Updated 6 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- ☆29Updated 2 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Binary file entropy visualizer written in Python☆54Updated 2 months ago
- A tool for predicting the output of random number generators☆191Updated 7 years ago
- ☆88Updated 9 years ago
- Pure Python SSL, TLS and DTLS library☆36Updated 7 years ago
- Implementation of Kravatte Encryption Suite☆15Updated 6 years ago
- Generate strong passwords using /dev/urandom 👻☆15Updated 7 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 6 years ago
- GPL Number Field Sieve implementation☆35Updated 14 years ago
- Assignments for the cryptography engineering course☆12Updated 11 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- A framework for streamlining the capture of PANDA execution traces.☆56Updated 4 years ago
- strings for a Linux process' address space☆51Updated 11 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago