alan-mushi / libressl-RSA-backdoor
LibreSSL with a backdoor in RSA key generation
☆16Updated 8 years ago
Alternatives and similar repositories for libressl-RSA-backdoor:
Users that are interested in libressl-RSA-backdoor are comparing it to the libraries listed below
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Chrome extension for blocking x-origin cookies☆10Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Network white noise collector☆18Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- ☆18Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆34Updated 7 years ago
- python based backdoor software☆17Updated 13 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- TLS SNI virtual hosts bruteforcer☆20Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago