C2SP / wycheproofLinks
Project Wycheproof tests crypto libraries against known attacks.
☆2,973Updated this week
Alternatives and similar repositories for wycheproof
Users that are interested in wycheproof are comparing it to the libraries listed below
Sorting:
- A transparent and secure way to look up public keys.☆1,573Updated 4 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,895Updated 5 years ago
- Library and command line tool to detect SHA-1 collision in a file☆1,382Updated 2 months ago
- Easy-to-use crypto toolkit☆1,094Updated 6 years ago
- An implementation of the TLS/SSL protocols☆4,679Updated last week
- Auditing for TLS certificates.☆886Updated 2 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- TLS 1.3 Specification☆575Updated last month
- This project has been moved to:☆1,461Updated 4 years ago
- Modern Memory Safety in C/C++☆1,217Updated 9 years ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆805Updated 8 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆862Updated 3 months ago
- A system automation and configuration management stack targeted toward operational flexibility and policy compliance.☆1,331Updated 6 years ago
- Home to public development of NIST Special Publication 800-63-3: Digital Authentication Guidelines☆718Updated 4 months ago
- Scalable fuzzing infrastructure.☆5,512Updated last week
- a general-purpose fuzzer☆1,286Updated 7 years ago
- Guidelines for low-level cryptography software☆1,186Updated 2 years ago
- A libre cross-platform disassembler.☆1,442Updated 7 years ago
- DOM fuzzer☆1,768Updated last year
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,297Updated 2 weeks ago
- ROCA: Infineon RSA key vulnerability☆490Updated 2 years ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,064Updated 4 years ago
- End-To-End is a crypto library to encrypt, decrypt, digital sign, and verify signed messages (implementing OpenPGP)☆4,130Updated 2 years ago
- Web framework that allows performing periodic syncs of data sources and performing analysis on the identified results☆2,645Updated 6 years ago
- Wannacry in-memory key recovery☆1,089Updated 8 years ago
- Personalized, user-focused recommendations for employee information security.☆2,005Updated 2 years ago
- Architectural privilege escalation on x86☆856Updated 7 years ago
- Sniffing browser history using HSTS☆936Updated 8 years ago
- A proposed standard that allows websites to define security policies.☆1,848Updated 3 years ago
- ☆2,193Updated 2 years ago