Python framework to solve crypto problems using grainofsalt and cryptominisat
☆14May 24, 2022Updated 3 years ago
Alternatives and similar repositories for crypto-sat-solve
Users that are interested in crypto-sat-solve are comparing it to the libraries listed below
Sorting:
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- Android App that genereates passcode authentication codes for Postfinance cards☆12Feb 22, 2022Updated 4 years ago
- ☆82Oct 15, 2021Updated 4 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Albums for the Illustrated RFID gallery☆38Jun 9, 2025Updated 8 months ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last week
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Python bindings for the Zydis disassembler library☆17Jul 2, 2019Updated 6 years ago
- Gather information on Wiki contributions from IP ranges☆23Jan 21, 2018Updated 8 years ago
- a PCB for connecting UHF-RFID readers to your flipper, and an SEC1210 iC to interface with a SAM☆22Jan 28, 2026Updated last month
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- A tool based on libnfc that executes an active authentication and encrypted communication with a CryptoRF tag☆22Sep 1, 2020Updated 5 years ago
- A reference of the different types of access control card readers and which countries they're commonly found in☆18Oct 19, 2022Updated 3 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- ☆24Mar 12, 2025Updated 11 months ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Proxmark3 client for Android☆27Jul 2, 2017Updated 8 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 6 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- An Exploration into Graph Databases☆28Oct 7, 2015Updated 10 years ago
- Enhanced QDLink without handbreak detection and many other restrictions.☆11Apr 13, 2023Updated 2 years ago
- Research on the Gallagher / Cardax access control system☆67Jan 9, 2020Updated 6 years ago