Python implementation of the Digital Signature Algorithm
☆21Sep 25, 2014Updated 11 years ago
Alternatives and similar repositories for DSA
Users that are interested in DSA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DSA Signature Algorithm - A simple implementation in Python☆12Apr 8, 2018Updated 8 years ago
- ☆21Oct 14, 2022Updated 3 years ago
- Generate two PDFs with different contents but identical SHA1 hashes.☆22Mar 11, 2017Updated 9 years ago
- Garbled circuits in Python☆25Jun 1, 2017Updated 8 years ago
- 华南师范大学Beamer模板☆15Nov 11, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Lattice-Based Post-Quantum Authenticated Key Exchange☆21May 19, 2017Updated 8 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Tool for Automating efficient Secure Two-partY computation protocols☆10Nov 10, 2016Updated 9 years ago
- Collection of Security Related Examples for Learning Purposes☆13Jan 29, 2016Updated 10 years ago
- From this tutorila you can learn how to print with POS printer from android app.☆14Jan 8, 2016Updated 10 years ago
- Computer Systems Security Assignments used for class.☆10Jun 11, 2017Updated 8 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Jul 13, 2015Updated 10 years ago
- ☆13Mar 23, 2018Updated 8 years ago
- Android application that prints using zebra printers☆14Jun 15, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Keccak Code Package☆13Oct 24, 2025Updated 5 months ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Tools for timing attacks☆19Oct 19, 2015Updated 10 years ago
- Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project☆56Feb 2, 2012Updated 14 years ago
- Create adversarial images to fool a MNIST classifier in TensorFlow☆14Jun 8, 2017Updated 8 years ago
- A simple tool that allows you to use your Android device's NFC to emulate the ID of a Mifare Card☆12Oct 22, 2017Updated 8 years ago
- Code for reproducing key results in the paper "Improving the Neural GPU Architecture for Algorithm Learning" by Karlis Freivalds, Renars …☆13Jul 4, 2018Updated 7 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆18Nov 24, 2020Updated 5 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- Lorem Ipsum, but for people [android]☆18Jul 25, 2015Updated 10 years ago
- Thinking questions for Mr. Wu Jun's book "The Soul of Computing". The answers will refer to the ideas provided in the book "The Soul of C…☆35Mar 27, 2024Updated 2 years ago
- Source for paper "Attacking Binarized Neural Networks"☆23Mar 23, 2018Updated 8 years ago
- ☆12Feb 19, 2026Updated last month
- ☆16May 20, 2022Updated 3 years ago
- Starter Kit for the ACRV Robotic Vision Challenge 1☆13May 16, 2019Updated 6 years ago
- CasCADe 4D visualization system for virtual construction planning☆15Feb 13, 2021Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- FIGR-8, but images in .SVG vector graphics format☆15Feb 16, 2019Updated 7 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Automatize local data analysis with team of tool-using GPT agents☆16Apr 1, 2024Updated 2 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Convert any Java object to JSON for easier debugging☆26Sep 2, 2015Updated 10 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year