Signature scheme submitted to NIST's Post-Quantum Cryptography Project
-
Updated
Dec 6, 2017 - C
Signature scheme submitted to NIST's Post-Quantum Cryptography Project
Signature scheme submitted to NIST's Post-Quantum Cryptography Project
🏴☠️ Tools for pen-testing, CTFs & wargames. 🏴☠️
pwordman is a barebones CLI password manager. It stores passwords under AES256-CBC encryption. It uses cryptographic random byte generators and OpenSSL.
C language based project from where we came to know how many users in the system, how much credit they have, how to keep track of information such as user id, full name, password, and credits (in clients.txt), how to add and remove a user. Admin and client window.
Our tool is able to gather dumps of all executable pages of packed processes.
A repository that includes common helper functions for writing applications in the DPDK. I will be using this for my future projects in the DPDK.
Program examples utilizing the DPDK. The DPDK is a kernel-bypass network library that allows for very fast network packet processing. This is great for (D)DoS mitigation and low-latency packet inspection, manipulation, and forwarding.
This repository is meant for the tools, rules, accessories for hash functions, Simple ciphers and Cyber-sec bash scripts for personalized usage
SMB vulnerabilities have been around for 20+ years. In general, most cyber-attacks involving SMB do not occur because an enterprise failed to procure an expensive tool or application, but rather because there was a failure to implement best practices surrounding SMB.
THAMARA - Threat Hunting with AMSI and YARA
Foi feito o estudo de um repositório simulando a vulnerabilidade de um buffer overlow, documentamos como conseguimos rodar o código e fizemos uma modificação no shellcode para executar outro comportamento (desligar a maquina virtual)
A simple malware creation tool
WiFi-Deauther: Wi-Fi security tool with ESP8266 for deauth attacks and monitoring.
ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
Add a description, image, and links to the cyber topic page so that developers can more easily learn about it.
To associate your repository with the cyber topic, visit your repo's landing page and select "manage topics."