alan-mushi / libressl-RSA-backdoorLinks
LibreSSL with a backdoor in RSA key generation
☆17Updated 9 years ago
Alternatives and similar repositories for libressl-RSA-backdoor
Users that are interested in libressl-RSA-backdoor are comparing it to the libraries listed below
Sorting:
- ☆13Updated 7 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- ☆15Updated 8 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆23Updated 8 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 8 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆37Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- A strcmp timing attack example☆9Updated 10 years ago