samuel-lucas6 / crypto-is-coolLinks
A list of cryptography books, papers, blog posts, presentations, and Q&A answers.
☆19Updated 2 years ago
Alternatives and similar repositories for crypto-is-cool
Users that are interested in crypto-is-cool are comparing it to the libraries listed below
Sorting:
- A Course in Cryptanalysis☆148Updated last year
- Toolkit for creating cryptographic figures and videos.☆35Updated last year
- ☆106Updated 11 months ago
- Solutions to https://cryptopals.com problems☆28Updated 8 months ago
- PoC for our attacks on MEGA.☆29Updated 3 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆60Updated last year
- ☆79Updated last year
- Known attacks on Elliptic Curve Cryptography☆576Updated last year
- ☆35Updated 10 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 7 months ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆45Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆165Updated 3 months ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆13Updated last year
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆19Updated 9 months ago
- White-box Design and Analysis kit☆24Updated 2 years ago
- ☆22Updated 5 months ago
- ☆126Updated 3 months ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆73Updated last year
- Deployments of fancy cryptography☆171Updated 2 months ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆59Updated 6 months ago
- A tool to perform so called BGE attack☆25Updated 6 months ago
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated this week
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆56Updated 3 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆99Updated 2 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- ☆112Updated 2 years ago
- MD4 Collisions MD4 is a 128-bit cryptographic hash function, meaning it should take a work factor of roughly 2^64 to find collisions. It…☆17Updated 8 years ago
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆23Updated last year