Defence blues
AES challenges
Red wilds
Privacy greenhouse
Purple crossroads
Indigo observatory
Contact
Initializing search
Defence blues
Golem Trust Computing Ltd.
Department of Silent Stability
The Home for Bewildered Beasts of Legend
Stormforge training grounds
Honeytech for humans
Blue team @Purpleteaming
Blue team @Purpleteaming
In the beginning …
Middle ground
Middle ground
Persistence
Buffer overflows
Reverse engineering
Steganography
Cryptanalysis
Cryptanalysis
Cryptanalysis notes
Root-
me cryptanalysis challenges
Root-
me cryptanalysis challenges
Old tricks, new treats:
Unmasking classical ciphers
AES challenges
AES challenges
AES Electronic code book
Initialisation vector
AES challenges
AES challenges
Table of contents
AES Electronic code book
Initialisation vector
Riding the currents:
Stream cipher exploits
Unlocking RSA:
Asymmetric mischief
Curves ahead:
Navigating elliptic curve cryptography
The raccoon’s secret recipes for digital mischief
Evasion
End of story
Blue team @SOC
Blue team for dev
Blue team @Home
Bulletproofing servers
AES challenges
¶
AES mode weaknesses.
AES Electronic code book
Initialisation vector
Back to top