Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
2 votes
1 answer
178 views

An evolutionary algorithm written in Java to crack an XOR cipher

Alright. So TryHackme is a website that tries to teach hacking with hands on labs. They have a room called JVM Reverse Engineering where the user gets to reverse engineer Java apps, and in particular ...
Aleksey's user avatar
  • 173
1 vote
1 answer
42 views

tokenize char array with PolarSSL library

I'm trying to perform a decryption operation using RSA. I'm using the PolarSSl library. I have a char array key[] that contains RSA private key like the following, <...
user45698746's user avatar
3 votes
2 answers
108 views

Simple Password Generator Feedback

This is my first major project in F#, looking for any critique on how I can make it more standard or more concise. Some things I feel like I could have done better are the command flag parsing and the ...
Dalton Edmsiten's user avatar
4 votes
0 answers
166 views

SHA256 implemented in Rust

I just finished making an implementation of a SHA256 hashing function (https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf) in Rust and I was looking for some feedback. As far as I can tell it ...
user668074's user avatar
9 votes
2 answers
4k views

Data encryption with python

I am just trying to solve one of the puzzle which is explained below: The sentence if man was meant to stay on the ground god would have given us roots after ...
Here_2_learn's user avatar
2 votes
1 answer
152 views

Vector-based Null Cipher

Continuing with my series of cipher programs, I hastily wrote a null cipher program, and I was wondering how it could be improved: ...
esote's user avatar
  • 3,770
2 votes
1 answer
956 views

Split string into "n" lengths with padding

I quickly wrote a short program to split a string into \$n\$ lengths with variable-character padding: ...
esote's user avatar
  • 3,770
2 votes
2 answers
1k views

String Encryption

I was asked to make a String encryption utility without using encryption API I basically had to come up with my own ecryption methodology! the program was to be able to encrypt a string and decrypt a ...
Eudy Contreras's user avatar
3 votes
3 answers
361 views

A hash-signature-type which tests on comparing against normal strings

I decided to throw this together today figuring it would be cool to add to my repertoire. Before we always had performed this "task" externally. Find the value we want to compare, hash it and compare ...
David Carrigan's user avatar
4 votes
1 answer
134 views

String encryption function in admin section

I have been using this function locally to encrypt strings for example a username. If the user successfully logged in, place the encrypted username into a session,...
CodeX's user avatar
  • 1,053
5 votes
2 answers
28k views

Hiding $_GET variables using encryption

I use the following functions to encrypt my $_GET variables (whenever I can't easily get away with using $_POST or some other ...
nathan hayfield's user avatar
3 votes
1 answer
242 views

WMSAuth implementation

I have to implement WMSAuth in C#: http://wmsauth.org/examples ...
Mariano Desanze's user avatar
5 votes
2 answers
3k views

Encryption/decryption of data

I'm trying to work with some encryption/decryption of data. It was some hard work for me to get it working with some buffers and what not. This is the code I came up with: ...
SimonLanghoff's user avatar