Solutions for the Matasano Crypto Challenges
☆24Oct 15, 2018Updated 7 years ago
Alternatives and similar repositories for matasano
Users that are interested in matasano are comparing it to the libraries listed below
Sorting:
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 10 months ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Feb 11, 2026Updated 2 weeks ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 9 months ago
- Presentation repository around making an API that retrieves large amounts of geospatial data quickly☆12Mar 7, 2023Updated 2 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidity☆13Nov 2, 2018Updated 7 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 8 months ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- shw's CTF challenges☆27Apr 5, 2021Updated 4 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- Toolset to index the Mastodon federated network.☆13Nov 10, 2022Updated 3 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Feb 19, 2026Updated last week
- Architecture - design and implementation of the D4 project architecture☆16Jul 3, 2025Updated 8 months ago
- Optimizations for Pairing-Based Cryptography☆17Sep 10, 2021Updated 4 years ago
- Self-Hosting Security Dashboard☆14Feb 13, 2019Updated 7 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Sep 5, 2020Updated 5 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Auditing Applied Cryptography☆11Sep 26, 2019Updated 6 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆19Jan 9, 2026Updated last month
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Ethereum (solidity) code for nucypher-kms☆18Apr 10, 2018Updated 7 years ago
- Scripts to deploy and update MISP in air-gapped environments☆17Jan 20, 2026Updated last month
- var config = { name: 'KTN Bot', userid: function () { return toId(this.name); }, group: '@', join: true, …☆13Sep 29, 2015Updated 10 years ago
- RSA Tool for CTF challenges in golang☆47Dec 21, 2025Updated 2 months ago
- notes, ideas and whatnot☆42Dec 1, 2021Updated 4 years ago
- Scan for giveaways of fake Mobile Base Stations to detect them.☆21May 19, 2016Updated 9 years ago
- The Smart Contracts for the DIP Tokensale☆18Jan 25, 2019Updated 7 years ago
- Writeups for past CTFs I've joined☆18Jun 1, 2021Updated 4 years ago
- Go heap dump viewer with object graphs. (Works with Go 1.21)☆26Aug 13, 2024Updated last year
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated last month
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Updated this week
- Notes on cryptographic schemes and attacks☆25Dec 13, 2018Updated 7 years ago