MEGA-Awry / attacks-pocLinks
PoC for our attacks on MEGA.
☆27Updated 3 years ago
Alternatives and similar repositories for attacks-poc
Users that are interested in attacks-poc are comparing it to the libraries listed below
Sorting:
- A Tamarin model and analysis of EMV☆31Updated 4 years ago
- My experiments in understanding AES, Whitebox AES, and related attacks☆16Updated 4 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆40Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago
- A tool to perform so called BGE attack☆24Updated last year
- SageMath/Python Toolkit for Cryptanalytic Research☆40Updated 2 weeks ago
- Infer internal state of Mersenne Twister from truncated output☆76Updated 2 years ago
- Complex multiplication based factorization☆38Updated 3 years ago
- ☆18Updated last year
- Protect domains from malicious browser extensions☆16Updated last month
- Solutions to https://cryptopals.com problems☆28Updated last month
- TrustZone Trusted Application 0-Days by Design☆20Updated 3 weeks ago
- Simple attacks on AES-ECB☆21Updated 4 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Updated 4 years ago
- White-box Design and Analysis kit☆24Updated 2 years ago
- Typora theme based on the CryptoHack blog☆33Updated 4 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- ☆11Updated 3 years ago
- Homemade implementation of Square Attack against 4 rounds AES☆14Updated 5 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆83Updated 4 months ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆82Updated 4 years ago
- Materials from the DEF CON 30 talk on PACMAN☆32Updated 2 years ago
- Use md5-collisions to make evil executables looking like a good one.☆29Updated 5 years ago
- Toolkit for creating cryptographic figures and videos.☆32Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Another™ MCP Server for Binary Ninja with superpower 🥵☆23Updated 3 weeks ago
- ☆13Updated 4 years ago
- A list of cryptography books, papers, blog posts, presentations, and Q&A answers.☆17Updated last year
- ☆48Updated 2 years ago