bozhu / AES-GCM-PythonLinks
A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).
☆46Updated 8 years ago
Alternatives and similar repositories for AES-GCM-Python
Users that are interested in AES-GCM-Python are comparing it to the libraries listed below
Sorting:
- SCALE: Side-Channel Attack Lab. Exercises☆44Updated 2 years ago
- Pure python, slow and standard implementation of PKCS #1 also knows as RSA☆31Updated 2 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Updated 7 years ago
- Write ups☆16Updated 8 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- PyCryptoPlus: a pycrypto extension written 100% in Python☆76Updated 9 years ago
- ☆77Updated 7 years ago
- ☆153Updated 7 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Updated 3 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- This repository contains examples of Flush+Flush cache attacks☆169Updated 4 years ago
- Tools for "Another Flip in the Wall"☆41Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆78Updated 6 years ago
- White-box Analysis and Implementation Tools☆78Updated 4 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Updated 6 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- An ELF parsing and manipulation library for Python☆74Updated 11 years ago
- Stealth's 64bit injectso port☆73Updated 15 years ago
- A python implementation of the block cipher RC4☆41Updated 8 years ago
- ☆49Updated 7 years ago
- Reverse Engineering tool for Ethereum EVM☆19Updated 9 years ago
- Cracking 2DES using a meet-in-the-middle attack implemented in python 3.☆15Updated 10 years ago
- hax 'n shit☆121Updated 10 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Updated 4 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- ☆197Updated last year
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago