ALRBP / Attack-Argon2iLinks
An effective attack against the Argon2i hash function
☆9Updated 7 years ago
Alternatives and similar repositories for Attack-Argon2i
Users that are interested in Attack-Argon2i are comparing it to the libraries listed below
Sorting:
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- ☆36Updated 12 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- ☆15Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- ☆17Updated 10 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- ☆17Updated 7 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- ☆24Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- ☆13Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 3 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago