arisada / dualec_pocView external linksLinks
This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg
☆52Dec 26, 2013Updated 12 years ago
Alternatives and similar repositories for dualec_poc
Users that are interested in dualec_poc are comparing it to the libraries listed below
Sorting:
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Python API and REST API for the Checkmarx WSDL☆13Feb 11, 2016Updated 10 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- ☆37Dec 10, 2018Updated 7 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Generate tweets with Titter GPT, an easy to use streamlit app leveraging OpenAI's GPT-3 model and revGPT. Create custom tweet styles, ton…☆24May 16, 2023Updated 2 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Jun 25, 2020Updated 5 years ago
- A Sage implementation of the ROCA attack☆27May 16, 2023Updated 2 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 8 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 9 months ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Aug 28, 2018Updated 7 years ago
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆19Dec 18, 2025Updated last month
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- MemcacheD Proof of Concept☆22Mar 6, 2018Updated 7 years ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆80Jan 30, 2019Updated 7 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Tool for computing elliptic curve (EC) discrete logarithms☆37Jul 8, 2017Updated 8 years ago
- Software for Xmega-A1 Xplained board with MAX4619 glitch circuit☆42Jan 27, 2017Updated 9 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- 修改 pyTranscriber 得到 cli 版的 mypyTranscriber☆10Jun 9, 2021Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated 2 weeks ago
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 7 months ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year