ALRBP / Attack-Argon2iLinks
An effective attack against the Argon2i hash function
☆9Updated 7 years ago
Alternatives and similar repositories for Attack-Argon2i
Users that are interested in Attack-Argon2i are comparing it to the libraries listed below
Sorting:
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- ☆36Updated 12 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- ☆15Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- ☆24Updated 10 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- ☆17Updated 10 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Code to fuzz bignum libraries☆46Updated 6 years ago
- ☆13Updated 4 years ago
- free crypto audit☆31Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Does your library check TLS certificates properly?☆79Updated last year
- Memory awesomeness.☆29Updated 10 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Shellcodes for different usecases☆9Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Quantum Insert/FoxAcid case study☆15Updated 8 years ago