free crypto audit
☆31Mar 28, 2017Updated 9 years ago
Alternatives and similar repositories for fca
Users that are interested in fca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 8 years ago
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated 2 years ago
- Python script to quickly create hand-crafted PDF files☆24Oct 22, 2017Updated 8 years ago
- the cyber crypto cryptocoin☆35Dec 18, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆15Mar 27, 2018Updated 8 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- CTF Writeups☆23May 9, 2018Updated 7 years ago
- Like Russian roulette, but for your kernel.☆14Jul 13, 2025Updated 9 months ago
- ☆171Mar 15, 2021Updated 5 years ago
- A modular, scalable, fast and reliable phishing detection framework☆11Dec 1, 2018Updated 7 years ago
- A package for serving `security.txt` in Laravel 5.5+, based on configuration settings. https://securitytext.org/☆10Mar 21, 2019Updated 7 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆52Aug 5, 2022Updated 3 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- Batching zero over k checks☆11Feb 11, 2023Updated 3 years ago
- Public resources NB shares☆18Mar 7, 2016Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- mozilla: Firefox's X.509 certificate verification core code.☆21Oct 7, 2015Updated 10 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- ☆10Jul 5, 2016Updated 9 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Aug 5, 2016Updated 9 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- Repository merger for apt-based distros☆14Jun 17, 2019Updated 6 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Nov 30, 2016Updated 9 years ago
- Cryptography Final Project: Merkle Signature Scheme implementation☆15Dec 11, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Dynamic binary translator for x86 binaries☆38Apr 7, 2023Updated 3 years ago
- ☆10Aug 21, 2022Updated 3 years ago
- Implementation of the Groth16 zk-SNARK proving system☆21Jul 6, 2018Updated 7 years ago
- ☆12Nov 10, 2023Updated 2 years ago
- LoFiRe Rust implementation☆17Feb 2, 2023Updated 3 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Oct 5, 2017Updated 8 years ago