samuel-lucas6 / crypto-is-coolLinks
A list of cryptography books, papers, blog posts, presentations, and Q&A answers.
☆17Updated last year
Alternatives and similar repositories for crypto-is-cool
Users that are interested in crypto-is-cool are comparing it to the libraries listed below
Sorting:
- PoC for our attacks on MEGA.☆27Updated 3 years ago
- Toolkit for creating cryptographic figures and videos.☆32Updated last year
- A Course in Cryptanalysis☆145Updated 7 months ago
- The hmac-bcrypt password hashing function☆64Updated 4 months ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆92Updated this week
- Deployments of fancy cryptography☆144Updated last month
- Radamsa fuzzer ported to rust lang☆153Updated 2 months ago
- List of crackpot 'scientists' and 'thinkers'☆19Updated last week
- Damn Vulenerable Kernel Module for kernel fuzzing☆60Updated 7 months ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆98Updated 2 years ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆15Updated 2 months ago
- ☆26Updated 2 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆55Updated 3 years ago
- ☆72Updated 5 years ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 11 months ago
- examples of using radius2 to solve reversing challenges☆35Updated 5 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆64Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆132Updated 2 years ago
- Binarly Vulnerability Research Advisories☆174Updated last month
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆69Updated last year
- io_uring based rootkit☆197Updated last month
- A GDB+GEF-style debugger for unloading Python pickles☆67Updated 5 months ago
- archive of the released challenges from corCTF 2021☆23Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- A binary hardening system☆109Updated last year
- Binary Golf Grand Prix☆58Updated 2 months ago
- LKRG bypass methods☆72Updated 5 years ago
- Simple attacks on AES-ECB☆21Updated 4 years ago
- Userland exec PoC to be used as attack vector technique☆85Updated 4 months ago