-
-
Java-Tetris-Attack
This is my summer project: A Java clone of the Super Nintendo game Tetris Attack
-
hash-attack
... If no text is entered, pressing "Collide!" will initiate a collision attack in which the program
generates strings of a random ... string is entered, pressing "Collide!" will begin a pre-image attack in which the program
will compare the truncated digests of ...
-
tetris-attack-flash
The start of an unfinished tetris attack clone I worked on around 2003/4
An unfinished Tetris Attack clone from 2003/4. Nothing much to see here.
-
Attack-Vector
Simplistic 3D dogfighter
Attack-Vector
=============
Simplistic 3D dogfighter
-
-
EAP-attack-utils
EAP-attack-utils
================
针对校园网EAP协议的简单攻击工具。
依赖
------------
* Linux
* Python2
使用
----
### 基本结构
``` bash
$ tree
.
├── LICENSE
├── README.md
├── eappacket.py # EAP ...
-
Attack-Tortoise
Project I used to learn python. It's really bad
Attack Tortoise
==============
A horrible game I wrote years ago
Requirements
------------
* python2
* pygame
* A sense of humor
How to play
----------
cd src/
python2 main.py
Left/right moves, ...
-
Attack
Shilling Attack Simulator
-
wieners-attack-rsa
... key
Cryptography
This project is an implementation of Wiener's attack on RSA public key system. The implementation algorithm based on ... . pp 203 – 213.
[3] A. Dujella, A variant of Wieners attack on RSA. Computing, Vol. 85. May 2009. Springer-Verlag 2009 ...
-
Padded-Oracle-Attack
... in C and decrypts ciphertexts encrypted with AES in CBC mode. The attack relies on the ability to query the oracle function *cbcdec*, ... succeeds or not.
The implementation can be found in the file *attack.c*. Run *make* to compile the project and run the ...
-