OpenWhiteBox / AESLinks
Implementations of white-box AES constructions and their cryptanalyses.
☆219Updated 8 years ago
Alternatives and similar repositories for AES
Users that are interested in AES are comparing it to the libraries listed below
Sorting:
- ☆170Updated 4 years ago
- Whitebox AES implementation in C++. Chow, Karroumi.☆353Updated 2 years ago
- Whitebox AES☆53Updated 11 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- A light ELF binary patch tool in python urwid☆147Updated 5 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- Bindings of the r2 api for Valabind and friends☆131Updated 10 months ago
- midgetpack is a multiplatform secure ELF packer☆204Updated 10 years ago
- prototype of whitebox AES in C . Luo,Lai,You☆21Updated 9 years ago
- gapstone is a Go binding for the capstone disassembly library☆151Updated 5 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆659Updated last year
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Whitebox implementation of AES and ARIA.☆30Updated 4 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Source code of the Whitebox Contest Submission Server☆34Updated 11 months ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- ☆90Updated 8 years ago
- TLS Library in python☆235Updated 3 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆112Updated 8 years ago
- gdb plugin for android debugging☆104Updated 9 years ago
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆71Updated 4 years ago
- The DrK Attack - Proof of concept☆345Updated 3 years ago
- A reversible DER and BER pretty-printer.☆245Updated 3 months ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 8 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆314Updated 11 months ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆314Updated 5 years ago