Skip to content

Instantly share code, notes, and snippets.

/*
The MIT License (MIT)
Copyright (c) 2014 sinfonier-project
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
'''
Login system for brute-force
in the Ciphertext-only attack
by geolado | g3ol4d0
'''
import os
#coding: utf-8
'''
Ciphertext-only attack (COA)
http://en.wikipedia.org/wiki/Ciphertext-only_attack
no "K2 - Cryptographic Hash" do KoubackTr
by geolado | g3ol4d0
'''
'''
Chosen-plaintext attack (CPA)
http://en.wikipedia.org/wiki/Chosen-plaintext_attack
no "K2 - Cryptographic Hash" do KoubackTr
by geolado | g3ol4d0
A ideia eh simples . Ele cria uma lista com os caraceteres e manda para codificar ,
depois retorna o resultado para cada caractere , "quebrando" a codificacao .
@caioluders
caioluders / heartbleed.py
Created May 2, 2014 13:09
CVE-2014-0160 Edited by geolado | g3ol4d0 Changes : # 1 - Add loop and filter options # 2 - No longer printing pure hex and other garbage stuff ... # 3 - Not repeat
#!/usr/bin/python
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org)
# The author disclaims copyright to this source code.
# Edited by geolado | g3ol4d0
# Changes :
#
# 1 - Add loop and filter options