This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg
☆52Dec 26, 2013Updated 12 years ago
Alternatives and similar repositories for dualec_poc
Users that are interested in dualec_poc are comparing it to the libraries listed below
Sorting:
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Python API and REST API for the Checkmarx WSDL☆13Feb 11, 2016Updated 10 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- Generate tweets with Titter GPT, an easy to use streamlit app leveraging OpenAI's GPT-3 model and revGPT. Create custom tweet styles, ton…☆24May 16, 2023Updated 2 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- Linux/Unix Security Auditing Scripts: Lusas☆23Jun 27, 2017Updated 8 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆65Aug 28, 2018Updated 7 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆20Dec 18, 2025Updated 2 months ago
- MemcacheD Proof of Concept☆22Mar 6, 2018Updated 8 years ago
- Deploy scikit-learn models to a REST API using Docker☆10May 1, 2023Updated 2 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Este projeto é fruto de um estudo pessoal sobre o algoritmo Secp256k1. O objetivo dele é conseguir obter, usando apenas os valores da cha…☆12Dec 7, 2022Updated 3 years ago
- A collection of crackmes☆41Jan 20, 2025Updated last year
- Tool for computing elliptic curve (EC) discrete logarithms☆37Jul 8, 2017Updated 8 years ago
- Software for Xmega-A1 Xplained board with MAX4619 glitch circuit☆42Jan 27, 2017Updated 9 years ago
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago
- 基于vue2的admin后台管理系统,含有登陆页面(带有滑动验证)、修改密码页面、404页面。封装了axios,将api地址放入环境变量。权限控制生成可访问的路由,并根据路由生成侧边导航栏。有任何问题可以联系我的邮箱chenzhipeng709@163.com如果喜欢请点个…☆15Jul 26, 2024Updated last year
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- 修改 pyTranscriber 得到 cli 版的 mypyTranscriber☆10Jun 9, 2021Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Oct 30, 2018Updated 7 years ago