Santandersecurityresearch / CryptoMon
Network Cryptography Monitor - using eBPF, written in python
☆18Updated this week
Related projects: ⓘ
- ☆21Updated 4 months ago
- Toolkit for creating cryptographic figures and videos.☆27Updated 4 months ago
- Go Trusted Execution Environment (TEE)☆103Updated last week
- Ledger Donjon CTF 2020☆17Updated 2 years ago
- Research tools developed for Intel Wi-Fi chips☆48Updated 8 months ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆13Updated 4 years ago
- ☆9Updated 2 years ago
- DFF (Digital Forensics Framework)☆10Updated 3 years ago
- A tool to perform so called BGE attack☆20Updated 5 months ago
- A tool to help you understand TPM commands and responses.☆32Updated 3 weeks ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆17Updated last week
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆47Updated 2 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆38Updated last year
- Framework for creating fuzzers and negative tests for TLS 1.3 implementations☆12Updated 5 months ago
- The Multiplatform Linux Sandbox☆15Updated 9 months ago
- iTLB multihit PoC☆39Updated 10 months ago
- ☆11Updated 11 months ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆89Updated 7 months ago
- random dissectors☆68Updated last year
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆32Updated 2 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆21Updated 2 years ago
- Scripts from Ghidra Golf competitions☆33Updated last year
- SPI flash read MitM attack PoC☆34Updated 2 years ago
- Conferences, tools, papers, etc.☆43Updated last week
- ☆25Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆103Updated last year
- Approximate matching using Hierarchical Bloom Filter Trees. Based on mrsh-v2.☆12Updated 3 years ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆17Updated 10 months ago
- Polyglot detector☆19Updated 5 months ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…