The Matasano Crypto Challenges Logo

The Matasano Crypto Challenges

0
Free
Visit Website

The Matasano Crypto Challenges are a set of 48 practical programming exercises that Thomas Ptacek and his team at Matasano Security have developed as a teaching tool. The challenges cover a wide range of topics in cryptography and are designed to help developers improve their skills in application security. The challenges are not documented anywhere, but they are designed to be tractable and can be completed with diligence, coffee, and graph paper. The challenges cover topics such as encryption, decryption, and hashing, and are designed to help developers improve their skills in application security. The challenges are a great way for developers to improve their skills in cryptography and application security, and are particularly recommended for developers who have no experience with application security.

FEATURES

ALTERNATIVES

BunkerWeb is a next-generation and open-source Web Application Firewall (WAF) with seamless integration and user-friendly customization options.

Akamai Client-Side Protection & Compliance is a security tool that monitors and protects against client-side threats on websites, aiding in PCI DSS v4.0 compliance.

IDAPython plugin for generating Yara rules/patterns from x86/x86-64 code through parameterization.

A low overhead rate limiter for your routes

A web-based tool for instrumenting and analyzing Android applications using Flask, Jinja, and Redis.

EvoMaster is an open-source tool that automatically generates system-level test cases for web APIs using AI-driven techniques.

An ASPM platform that provides software supply chain security through risk assessment, prioritization, and protection mechanisms.

A third-party Nginx module that prevents common web attacks by reading a small subset of simple rules containing 99% of known patterns involved in website vulnerabilities.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved