Stars
repeatedly run programs until they break, and be ready to attach a debugger
A collection of links related to Linux kernel security and exploitation
A Simple showcase for the Sea-of-Nodes compiler IR
stong / maple-ir
Forked from LLVM-but-worse/maple-irIndustrial IR-based static analysis framework for Java bytecode
Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.
Programm zum Flotten, Einfachen Runterladen von Dateien
SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: https://datatracker.ietf.org/doc/draft-michel-ssh3/
Network analysis tool for Attack Defence CTF
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge…
Python implementations of cryptographic attacks and utilities.
Automated cryptanalysis of substitution permutation network cipher