GoATTeam / GoATLinks
Geolocate your files!
☆16Updated 3 years ago
Alternatives and similar repositories for GoAT
Users that are interested in GoAT are comparing it to the libraries listed below
Sorting:
- ☆13Updated 4 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Auditing Applied Cryptography☆10Updated 5 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Fuzz Network Traffic☆18Updated 6 months ago
- Library Secruity dependency Checker☆12Updated 5 years ago
- quotes i like.☆15Updated 5 years ago
- List of crackpot 'scientists' and 'thinkers'☆19Updated 2 weeks ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 4 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆48Updated 3 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- E4's C2 server☆20Updated 4 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆17Updated 8 years ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- module for certexfil☆15Updated 3 years ago
- Audit Proposals and Reports for RandomX☆12Updated 5 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- A Purposefully Vulnerable Blockchain☆51Updated 4 years ago
- dev level ;-)☆10Updated 6 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆63Updated last month