thomwiggers / des-meet-in-the-middleView external linksLinks
Cracking 2DES using a meet-in-the-middle attack implemented in python 3.
☆15Sep 27, 2015Updated 10 years ago
Alternatives and similar repositories for des-meet-in-the-middle
Users that are interested in des-meet-in-the-middle are comparing it to the libraries listed below
Sorting:
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- A scraping and aggregating package using the CollegeFootballData API☆11Dec 11, 2020Updated 5 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A new neural distinguisher considering features derived from multiple ciphertext pairs☆12Nov 30, 2021Updated 4 years ago
- Linux Developer Libraries☆12May 8, 2017Updated 8 years ago
- A cross-platform, GPU-accelerated terminal emulator (debian packaging fork)☆11Aug 13, 2024Updated last year
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- A low-cost, DIY data diode for ICS☆11Sep 4, 2023Updated 2 years ago
- This repository contains supplemental materials for the IEEE InfoVis 2018 submission "Hypothetical Outcome Plots Help Untrained Observers…☆14Oct 29, 2018Updated 7 years ago
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- ☆12Jul 17, 2012Updated 13 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- ☆14Jul 26, 2025Updated 6 months ago
- ☆10May 25, 2023Updated 2 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- The best game bot for mobile game vHack OS. It completely automates your game. So do not hesitate and download and play 24/7 like everyon…☆18Sep 8, 2018Updated 7 years ago
- Python wrapper extension for C Whirlpool digest reference implementation.☆20Dec 30, 2023Updated 2 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Mig/cctools for Linux combo makefile thingy☆32Jun 7, 2016Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Archive of OCR'd tweets from Cesar Sayoc - A.K.A. the "MAGA bomber"☆10Oct 27, 2018Updated 7 years ago
- ARM JTAG/SWD debugger (BlackMagic port) based on RP2040.☆17Nov 13, 2025Updated 3 months ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- ☆15Jan 15, 2015Updated 11 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- ☆10Aug 27, 2023Updated 2 years ago