arisada / dualec_pocLinks
This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg
☆52Updated 11 years ago
Alternatives and similar repositories for dualec_poc
Users that are interested in dualec_poc are comparing it to the libraries listed below
Sorting:
- ☆35Updated 13 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 11 years ago
- Some RSA attacks with sage☆11Updated 9 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆61Updated 10 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- ELF packer for i386☆32Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- Research on WebAssembly☆41Updated 3 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆76Updated 6 years ago
- Copy of the contents at phrack.com☆41Updated 8 months ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Updated 12 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- Random number rootkit for the Linux kernel☆28Updated 9 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- ☆26Updated 7 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆35Updated 8 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- Writeups and solutions for RC3CTF 2016☆14Updated 9 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago