bozhu / AES-GCM-PythonLinks
A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).
☆46Updated 8 years ago
Alternatives and similar repositories for AES-GCM-Python
Users that are interested in AES-GCM-Python are comparing it to the libraries listed below
Sorting:
- A python implementation of the block cipher RC4☆41Updated 8 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 7 years ago
- Tools for "Another Flip in the Wall"☆39Updated 7 years ago
- AES on CUDA☆27Updated 16 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Updated 3 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 7 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆77Updated 6 years ago
- Implementations of the Simon and Speck Block Ciphers☆101Updated 7 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Updated 2 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- ☆152Updated 7 years ago
- White-box Analysis and Implementation Tools☆77Updated 3 years ago
- Write ups☆16Updated 8 years ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- ☆77Updated 7 years ago
- ☆17Updated 11 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- ☆16Updated 10 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- Deep learning side channel privileged memory reader☆45Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- ☆20Updated 6 years ago
- ☆12Updated 6 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- ssh key exchange layer for scapy☆13Updated 11 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago
- Cracking 2DES using a meet-in-the-middle attack implemented in python 3.☆15Updated 10 years ago