CameronLonsdale / lanternLinks
Cryptanalysis library for breaking classical ciphers
☆27Updated 6 years ago
Alternatives and similar repositories for lantern
Users that are interested in lantern are comparing it to the libraries listed below
Sorting:
- SCALE: Side-Channel Attack Lab. Exercises☆42Updated last year
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- hax 'n shit☆119Updated 10 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- Advanced buffer overflow and memory corruption security challenges☆188Updated 3 years ago
- ☆36Updated 12 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Seed recovery tool for PRNGs☆84Updated 9 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 7 years ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆73Updated 6 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- free crypto audit☆31Updated 8 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆162Updated 3 years ago
- Automated fuzzing framework☆122Updated 2 years ago
- Exploit Development and Reverse Engineering with GDB Made Easy☆38Updated 6 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- service to check internet accessibility☆42Updated last year
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago