Cracking 2DES using a meet-in-the-middle attack implemented in python 3.
☆15Sep 27, 2015Updated 10 years ago
Alternatives and similar repositories for des-meet-in-the-middle
Users that are interested in des-meet-in-the-middle are comparing it to the libraries listed below
Sorting:
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- A scraping and aggregating package using the CollegeFootballData API☆11Dec 11, 2020Updated 5 years ago
- Linux Developer Libraries☆12May 8, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 8 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- This repository contains supplemental materials for the IEEE InfoVis 2018 submission "Hypothetical Outcome Plots Help Untrained Observers…☆14Oct 29, 2018Updated 7 years ago
- A cross-platform, GPU-accelerated terminal emulator (debian packaging fork)☆11Aug 13, 2024Updated last year
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- ☆13Jul 26, 2025Updated 7 months ago
- 3.60 module dump☆10Aug 26, 2016Updated 9 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- The best game bot for mobile game vHack OS. It completely automates your game. So do not hesitate and download and play 24/7 like everyon…☆18Sep 8, 2018Updated 7 years ago
- ☆10May 25, 2023Updated 2 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Nov 27, 2025Updated 3 months ago
- ☆11Aug 2, 2017Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Mig/cctools for Linux combo makefile thingy☆32Jun 7, 2016Updated 9 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Python wrapper extension for C Whirlpool digest reference implementation.☆20Dec 30, 2023Updated 2 years ago
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 4 months ago
- THIS POC NO LONGER WORKS WITH THE NEW SNAPCHAT API☆17Jun 11, 2024Updated last year
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- ☆10Aug 27, 2023Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆19Dec 3, 2024Updated last year
- Archive of OCR'd tweets from Cesar Sayoc - A.K.A. the "MAGA bomber"☆10Oct 27, 2018Updated 7 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- A reference flow for open source implementations of POS devices able to read LNURL-withdraw links via NFC☆13Aug 26, 2022Updated 3 years ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- ARM JTAG/SWD debugger (BlackMagic port) based on RP2040.☆17Nov 13, 2025Updated 3 months ago
- [ARCHIVED] 2018 IPFS Developers Meeting in Berlin☆16Apr 16, 2020Updated 5 years ago
- A way to produce really small x86-64 Linux ELF files☆18Feb 10, 2013Updated 13 years ago