tuxxy / hazmat-mathLinks
Hazmat ECC arithmetic for Cryptography.io
☆28Updated 5 years ago
Alternatives and similar repositories for hazmat-math
Users that are interested in hazmat-math are comparing it to the libraries listed below
Sorting:
- ☆97Updated 8 years ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Updated 5 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 9 years ago
- Reproducing images using hex values☆28Updated 7 years ago
- A set of PS4 experiments using the WebKit exploit☆83Updated 9 years ago
- Hearts drawn with Python Matplotlib and C☆42Updated 6 years ago
- Pretty Curved Privacy☆122Updated 8 years ago
- ☆29Updated this week
- What if you could use bash from a filesystem?☆64Updated 6 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Demo Spectre with 70 lines code☆126Updated 7 years ago
- Search engine with a static webserver☆67Updated 3 years ago
- Enable piping of internal command output to external commands☆70Updated 7 years ago
- A steganography tool for text☆89Updated last month
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 8 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Pbd is a Python module to disassemble serialized protocol buffers descriptors (https://developers.google.com/protocol-buffers/).☆86Updated 4 years ago
- Simple interactive breakpoint library with with automatic variable injection.☆61Updated 7 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- A Gamma muxing tool☆54Updated 6 years ago
- global randomness beacon☆77Updated 5 years ago
- RTLSDR ADS-B dump1090 to Google BigQuery☆33Updated 6 years ago
- ☆89Updated 9 years ago
- What I Learned from porting my projects to FreeBSD☆115Updated 11 months ago
- An AIMGP (Automatic Induction of Machine code by Genetic Programming) engine☆92Updated 6 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- Configures a regular ubuntu server to run as a tor hidden server running apache utilising ansible☆41Updated 6 years ago
- Tornado HTTP/2 Client☆78Updated 2 years ago