Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.
☆12Apr 22, 2015Updated 10 years ago
Alternatives and similar repositories for compression-oracle
Users that are interested in compression-oracle are comparing it to the libraries listed below
Sorting:
- A small python library for exploiting simple chosen-plaintext attacks.☆40May 3, 2014Updated 11 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Aug 6, 2013Updated 12 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Oct 9, 2015Updated 10 years ago
- ## Now you can download the most powerful tools using this simple script ### Screenshot , non-deterministic pushdown automata (PDA…☆10Oct 22, 2016Updated 9 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- ☆11Mar 8, 2022Updated 3 years ago
- OMR JIT glue code implementing a Ruby JIT☆11Dec 6, 2016Updated 9 years ago
- Unpacks java-to-exe files converted by JWrapper☆12Dec 5, 2022Updated 3 years ago
- ☆13May 17, 2020Updated 5 years ago
- ☆13Sep 14, 2022Updated 3 years ago
- Create presentation with react component.☆10Dec 12, 2016Updated 9 years ago
- Tools once available from McAfee but are no longer☆13May 9, 2024Updated last year
- A collection of Windows functions, constants and macros predefined for you for win32-api☆24May 3, 2021Updated 4 years ago