Python implements JS reverse decryption to collect website data

Hi~ Hello everyone, this is the Demon King? ~! For more python source code/information/answers/tutorials, etc. Click here to jump to the end of the article and get the business card for free. Environment usage: Python 3.8 Pycharm nodejs Module usage: import requests –> pip install requests import execjs –> pip install pyexecjs import json Implementing […]

RSA file encryption implemented in C language

This article was originally an open source implementation of Computer System Principle Experiment 2 of Shandong University Since the score for the Principles of Computer Systems experiment is based on the difficulty of the encryption algorithm, and encryption algorithms are obviously not the focus of Principles of Computer Systems, my implementation is open sourced for […]

Nginx implements tcp proxy and supports TLS encryption experiment

Nginx source code compilation Regarding the construction and configuration of nginx, please refer to the author’s previous article: Real-time streaming media server construction test (nginx + rtmp)_How to test online whether the streaming media rtmp is successfully built – the first half of the CSDN blog; the only change is the compilation parameters (Add the […]

QT implements decryption of m3u8 files

Article directory summary How to decrypt M3U8 files Implement ideas and code Sequence Diagram network request Decrypt in conclusion Summary Many video files are provided in the M3U8 file format. Let’s review what an M3U8 file is first! When using QT’s mutimedia framework to play videos, some videos load slowly and some videos load quickly. […]

[BUUCTF NewStar 2023] week5 Crypto/pwn

Some difficult questions in the last week Crypto last_signin It’s also a board question, but some people’s saved boards haven’t arrived, so I think it’s difficult. After all, we can’t write this board ourselves. Part of p is given, p is 1024 bits and 922-101 bits are given to the two ends. from Crypto.Util.number import […]

Variables and encryption in Ansible

1. Variable naming Like most programming languages, ansible’s built-in keywords cannot be used as variable names, including numbers, underscores, and letters. They can only start with underscores or letters. 2. Variable level Global: set from the command line or configuration file paly: set in play and related structures Host: a task consisting of a checklist, […]

Touge-Using RAS encryption and decryption in openssl

Level 1: RSA encryption and decryption Use the OpenSSL command line to implement RSA encryption and decryption of text files. Create a clear text file hello.txt with the content GuetPython Use genrsa to generate a 1024-bit plaintext rsa private key privacy.pem, that is, an unencrypted private key. Use rsa to output the public key file […]

20.5 OpenSSL socket RSA encrypted transmission

The RSA algorithm can also be used for encrypted transmission, but although this type of encryption algorithm is very secure, it is usually not used for large amounts of data transmission. This is because the encryption and decryption process of the RSA algorithm involves a large number of mathematical operations. Especially modular exponentiation (that is, […]