arisada / dualec_pocLinks
This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg
☆52Updated 11 years ago
Alternatives and similar repositories for dualec_poc
Users that are interested in dualec_poc are comparing it to the libraries listed below
Sorting:
- ☆35Updated 13 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆61Updated 10 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 11 years ago
- Symbol REPL☆31Updated 7 years ago
- Research on WebAssembly☆41Updated 3 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- Writeups of CTF challenges I do☆13Updated 6 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- Some RSA attacks with sage☆11Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Some slides from some presentations I have given☆25Updated 9 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Updated 8 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- A smart file fuzzer.☆26Updated 9 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆77Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Updated 7 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago