samuel-lucas6 / crypto-is-coolLinks
A list of cryptography books, papers, blog posts, presentations, and Q&A answers.
☆18Updated last year
Alternatives and similar repositories for crypto-is-cool
Users that are interested in crypto-is-cool are comparing it to the libraries listed below
Sorting:
- A Course in Cryptanalysis☆146Updated 10 months ago
- PoC for our attacks on MEGA.☆28Updated 3 years ago
- Toolkit for creating cryptographic figures and videos.☆33Updated last year
- Known attacks on Elliptic Curve Cryptography☆550Updated 9 months ago
- Sandwich is a multi-platform, multi-language, open-source library that provides a simple unified API for developers to use (multiple) cry…☆119Updated 2 months ago
- A curated list of resources about post-quantum cryptography.☆330Updated 2 weeks ago
- Collection of links on bad opsec☆100Updated last year
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆52Updated last week
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆78Updated last year
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆96Updated last week
- Solutions to https://cryptopals.com problems☆28Updated 4 months ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆71Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated 2 years ago
- Network Cryptography Monitor - using eBPF, written in python☆35Updated last week
- ☆22Updated 2 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆291Updated last week
- NSA Codebreaker Challenge 2021 Write-Ups☆56Updated 3 years ago
- ☆82Updated 2 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- A full English version of the popular ctf-wiki☆99Updated last year
- ☆102Updated 7 months ago
- 'Ike: A binary exploitation and reversing handbook.☆84Updated last week
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆44Updated 9 months ago
- A community driven resource for learning CryptoGraphy☆66Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- RSA Tool for CTF challenges in golang☆45Updated last year
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆122Updated this week
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆11Updated last year
- ☆146Updated 3 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆136Updated last year