☆102Apr 17, 2025Updated 10 months ago
Alternatives and similar repositories for Key-security
Users that are interested in Key-security are comparing it to the libraries listed below
Sorting:
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆33Apr 26, 2020Updated 5 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆37Feb 4, 2021Updated 5 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- Completely strips digital signatures from executables (.exe, .dll, .sys, .drv...) and fixes issues preventing resigning☆16Oct 19, 2025Updated 4 months ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- ☆36Mar 22, 2017Updated 8 years ago
- ☆41May 23, 2017Updated 8 years ago
- ☆10Feb 26, 2021Updated 5 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- ☆18Aug 23, 2025Updated 6 months ago
- Lints an authenticode signed binary.☆43Mar 15, 2025Updated 11 months ago
- Compact Proofs of Retrievability☆14May 28, 2014Updated 11 years ago
- ☆12Aug 4, 2025Updated 7 months ago
- Forked from upstream: http://sourceforge.net/projects/osslsigncode/☆11Dec 27, 2021Updated 4 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- A simple implementation of the Karatsuba multiplication algorithm☆11Apr 2, 2025Updated 11 months ago
- opsi-script aka. opsi-winst and other various tools.☆10Updated this week
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 5 months ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- Longest common subsequence parallel implementations☆11Mar 15, 2015Updated 10 years ago
- The project brings the power of the Linux kernel tracing to Kubernetes. It leverages existing kernel tracing frameworks such as ftrace, p…☆11Jan 8, 2024Updated 2 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- Stay updated with the latest deadlines for top Multi-Party Computation (MPC) events, including conferences, journals, and workshops. Neve…☆20Feb 24, 2026Updated last week
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- ECDSA VHDL Implementation☆12Apr 6, 2018Updated 7 years ago
- Collection of Windows kernel driver examples, offering insights into Windows internals, rootkit evasion, and advanced driver development.☆12Nov 23, 2023Updated 2 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- differential fault analysis attacks (DFA) against SM4☆17Jun 6, 2024Updated last year
- Tools used by many projects☆16Feb 25, 2026Updated last week