free crypto audit
☆31Mar 28, 2017Updated 8 years ago
Alternatives and similar repositories for fca
Users that are interested in fca are comparing it to the libraries listed below
Sorting:
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated last year
- Collection of red machine learning projects☆41Aug 16, 2021Updated 4 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 7 years ago
- Like Russian roulette, but for your kernel.☆14Jul 13, 2025Updated 7 months ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- ☆16Sep 26, 2016Updated 9 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Aug 27, 2019Updated 6 years ago
- RouterOS (Mikrotik) Backup over SSH☆19Feb 17, 2014Updated 12 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- CTF Writeups☆23May 9, 2018Updated 7 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆25Aug 5, 2016Updated 9 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- ☆24Sep 12, 2024Updated last year
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated last month
- Dynamic binary translator for x86 binaries☆38Apr 7, 2023Updated 2 years ago
- ☆31Updated this week
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Oct 19, 2017Updated 8 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Jan 17, 2018Updated 8 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Feb 9, 2024Updated 2 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- slam an HTTP/2 server a lot of concurrent load over a single TCP connection (for debugging something)☆29Mar 24, 2022Updated 3 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Jan 5, 2026Updated last month
- GrSecurity and PaX Patches Before End of Public Release☆64Jun 26, 2018Updated 7 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- ☆30Jan 13, 2026Updated last month
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- ACME client daemon that puts fresh HTTPS certs in setec, and client to get them out of at serving time. Ask your doctor if scertec is rig…☆37Sep 17, 2025Updated 5 months ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆61May 8, 2017Updated 8 years ago
- Lazy man's, user-mode union file system☆31Aug 21, 2015Updated 10 years ago