aczid / ru_crypto_engineeringLinks
Assignments for the cryptography engineering course
☆12Updated 11 years ago
Alternatives and similar repositories for ru_crypto_engineering
Users that are interested in ru_crypto_engineering are comparing it to the libraries listed below
Sorting:
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 3 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- Login Area Finder: scans host/s for login panels☆14Updated 11 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆929Updated 9 years ago
- Network white noise collector☆19Updated 9 years ago
- Scripts to aid in the manipulation of electromagnetic radiation (for use with gnu_radio and SDR).☆78Updated 8 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Power line communication through processor load modulation☆12Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- LibreSSL with a backdoor in RSA key generation☆17Updated 9 years ago
- NSA documents in machine readable form☆95Updated 7 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 8 months ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Updated 10 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Beat censorship at its own game.☆43Updated 11 years ago
- DefCon Hardware Hacking Village Learn To Solder Kit☆40Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- 1st phase of mifare classic nested auth key recovery☆23Updated 7 years ago
- A Linux Kernel that can be booted on GoPro Hero2/Hero3 cameras☆31Updated 9 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 8 years ago
- Every document published from the Snowden archive☆72Updated 10 years ago
- ☆31Updated 5 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- BOSSA is the programming software used to program SAM-based Arduino boards like Flutter. We added our chip.☆12Updated 10 years ago