bozhu / BMA
Berlekamp-Massey algorithm
☆11Updated 12 years ago
Alternatives and similar repositories for BMA:
Users that are interested in BMA are comparing it to the libraries listed below
- Complex multiplication based factorization☆37Updated 3 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 7 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆149Updated 5 years ago
- Some much-needed sanity for byte-wrangling in python3.☆43Updated 2 years ago
- ☆66Updated 5 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆23Updated 4 years ago
- ctf writeups☆19Updated 6 years ago
- Differential fault analysis framework for AES128☆48Updated 11 years ago
- A tool for finding the one gadget RCE in libc☆76Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- ☆55Updated 3 months ago
- Automatically format python interpreter results in hex☆25Updated 2 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- GDB plugin peda for arm☆146Updated 3 months ago
- ☆55Updated 4 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆120Updated 7 years ago
- ctfs write-up☆30Updated last year
- Research related☆88Updated 3 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- ☆12Updated 5 years ago
- Pure Python hash length extension module☆124Updated 2 years ago
- ☆27Updated 2 years ago
- A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz)☆92Updated 7 years ago
- CVP "trick" for CTF challenges☆133Updated last year
- Some kernel exploits☆144Updated 7 years ago
- A general way to Recover Safe linking protected value/pointer☆10Updated 2 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆22Updated 3 years ago
- Lazy python wrapper of KLEE for solving CTF challenges☆65Updated 4 years ago
- Debugger for the Shannon Baseband☆58Updated 4 years ago
- Implementation of the ROCA attack☆17Updated 4 years ago