featherduster
Crypto analyzer
An automated cryptanalysis tool with modular components for breaking various types of encryption
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
1k stars
54 watching
128 forks
Language: Python
last commit: about 3 years ago
Linked from 1 awesome list
cryptanalysiscryptocryptographyencryptionexploitexploitationexploitation-frameworkexploitspythonsecurity
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of Python scripts for analyzing and interacting with Cobalt Strike beacons. | 168 |
| A tool for analyzing and generating fingerprints of server cryptographic protocols and related settings. | 27 |
| An extension for Burp Suite to analyze JSON-RPC calls related to Ethereum smart contracts | 111 |
| A tool to identify and exploit vulnerable servers using Python | 333 |
| Analyzes network traffic data from captured packets to extract and decode specific protocols and information. | 183 |
| A tool for detecting security vulnerabilities in Elixir and Phoenix applications | 1,692 |
| A toolkit for analyzing and improving password cracking operations by identifying common patterns in leaked passwords. | 807 |
| A tool to disassemble and analyze compiled Python bytecode files (pyc) from various Python versions. | 133 |
| A tool to analyze binaries with IDA Pro and automate various tasks such as binary diffing and executing Python scripts. | 381 |
| A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data | 455 |
| A tool for bypassing client-side encryption in web applications during penetration testing and bug bounty activities | 192 |
| An extension that identifies argument injection vulnerabilities in web applications using payloads and detection techniques | 118 |
| An analysis tool for estimating the likelihood of binary compression or encryption | 43 |
| Analyzes and decomposes binary files used by the Sierra blockchain network | 10 |
| A tool to analyze Cisco device configurations and identify potential security vulnerabilities. | 444 |