bridgar / Castle-Covert-ChannelLinks
☆17Updated 10 years ago
Alternatives and similar repositories for Castle-Covert-Channel
Users that are interested in Castle-Covert-Channel are comparing it to the libraries listed below
Sorting:
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆118Updated 8 years ago
- Combining Unit Tests, Fuzzing, and AI☆302Updated 7 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆521Updated 7 months ago
- American Fuzzy Lop (AFL) and libjpeg-turbo built to play with fuzzing on Debian wheezy.☆40Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- KLEE in the browser☆54Updated 2 weeks ago
- Semantic Binary Code Analysis Framework☆124Updated 10 years ago
- ☆418Updated 10 years ago
- Sample application to let OpenSSL talk to itself (for fuzzing)☆34Updated 9 years ago
- X/Y o-scope simulator for playing audio waveforms☆17Updated 10 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆79Updated 8 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆107Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- The "Intel x86 considered harmful" paper☆200Updated 10 years ago
- Security advisories☆168Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- Automatic ROP chain generator☆12Updated 10 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆311Updated 4 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 10 years ago
- Samsung Remote Code Execution as System User☆127Updated 9 years ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆592Updated 5 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆295Updated 4 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- Quantum Insert☆214Updated 7 years ago
- A simple framework for developing Linux kernel heap exploit techniques☆114Updated 5 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago