Working through the Matasano Crypto Challenges (cryptopals.com)
☆36Oct 23, 2014Updated 11 years ago
Alternatives and similar repositories for matasano_challenge
Users that are interested in matasano_challenge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cryptopals answers☆23Oct 28, 2016Updated 9 years ago
- My solutions to Matasano Cryptopals challenge.☆30Nov 2, 2014Updated 11 years ago
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆34Aug 8, 2014Updated 11 years ago
- Solutions to Matasano crypto challenges in Python 3.☆108May 29, 2023Updated 2 years ago
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 8 years ago
- my write up about ctf☆15Jan 29, 2018Updated 8 years ago
- BinaryView Plugin for Microcorruption CTF memory dumps☆13Jul 16, 2019Updated 6 years ago
- CAs that are in the graph of trust☆13Oct 22, 2019Updated 6 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Google maps component for vue without 2-way data binding☆11Mar 6, 2025Updated last year
- ☆16Mar 27, 2018Updated 8 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Nov 21, 2022Updated 3 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- misc analysis script for hqx (hq2x hq3x hq4x) algorithms☆19Jun 21, 2014Updated 11 years ago
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- ☆171Mar 15, 2021Updated 5 years ago
- Statically linked Library detector☆70Jan 26, 2015Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- iOS Simulator, I got you.☆28Jul 31, 2017Updated 8 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 10 years ago
- GitHub Actions for MobSF☆26Apr 24, 2024Updated 2 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 11 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19May 21, 2015Updated 10 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Test case minimizer for afl-fuzz☆28Jul 19, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated last year
- Be able to execute memory snapshots so they can start running where they left off.☆37Apr 14, 2015Updated 11 years ago
- Recon materials☆26Nov 18, 2017Updated 8 years ago
- Cryptanalysis and attack library☆22Apr 12, 2022Updated 4 years ago
- odex crc patcher☆12Sep 28, 2017Updated 8 years ago
- Automate vulnerability triage which prioritizes remediation over discovery☆21Updated this week
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago