RUB-NDS / FutureTrust
FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Research and Innovation (Horizon 2020).
☆12Updated 2 years ago
Alternatives and similar repositories for FutureTrust:
Users that are interested in FutureTrust are comparing it to the libraries listed below
- Web of trust grapher☆39Updated 10 months ago
- free crypto audit☆31Updated 7 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- A user-first approach to threat modeling.☆16Updated 5 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- An effective attack against the Argon2i hash function☆9Updated 7 years ago
- Artifacts for the USENIX publication.☆57Updated 5 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- A history of PGP-related vulnerabilities☆23Updated 3 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Tools for timing attacks☆18Updated 9 years ago
- ☆10Updated 6 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- Random IPv6 - circumvents restrictive IP address-based filter and blocking rules☆23Updated 8 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- Vulnerability Reports by Aleph Research☆37Updated 11 months ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 10 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- Geolocate your files!☆16Updated 3 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- A tool (and library) for TACKs☆25Updated 7 years ago
- A tool to help you understand TPM commands and responses.☆37Updated 2 months ago
- ☆11Updated 4 years ago