An implementation of the concepts behind the Logjam attack
☆16May 1, 2016Updated 9 years ago
Alternatives and similar repositories for logjam-attack-poc
Users that are interested in logjam-attack-poc are comparing it to the libraries listed below
Sorting:
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- Raw data for numerical experiments exploring integer factorization on NISQ devices☆10Aug 30, 2018Updated 7 years ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- ☆14Nov 12, 2024Updated last year
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- PoC implementation of the POODLE attack☆69May 13, 2015Updated 10 years ago
- Integrate SmartThings with Bryant Evolution / Carrier Infinity☆10Feb 27, 2018Updated 8 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- EFI signing helper☆12May 3, 2020Updated 5 years ago
- RES in JavaScript☆14Sep 18, 2019Updated 6 years ago
- CZ3004/SC2079 Multidisciplinary Project (MDP) - Raspberry Pi☆22Aug 15, 2024Updated last year
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Firmware + tips & tricks for the Lanch HG-UV98 APRS Radio☆11May 20, 2022Updated 3 years ago
- Bleichenbacher's PKCS 1.5 Padding Oracle Attack.☆16Mar 7, 2021Updated 5 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- TI-58C/TI-59 calculator emulator for Android☆22Jan 6, 2015Updated 11 years ago
- Proprietary OpenCL drivers for Android☆18Feb 11, 2014Updated 12 years ago
- libOGC is actually RTEMS source code☆25Jan 28, 2025Updated last year
- This Xposed Module allows you to extends the SystemUI Tuner of Android 7.0 Nougat☆12Aug 27, 2016Updated 9 years ago
- An archive of Shii's Wiki (a major source for and the inspiration for the Bibliotheca Anonoma), which was uncermoniously deleted by the m…☆16Jan 22, 2018Updated 8 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 5 months ago
- Binary and Static Releases☆16Mar 7, 2026Updated 2 weeks ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- A streaming LZ predictor compression tool☆16Dec 7, 2018Updated 7 years ago
- Bookmarklet that toggle the numbers of Trello cards.☆11Apr 23, 2020Updated 5 years ago
- A repository for the HG-UV98 radio☆19Jul 10, 2019Updated 6 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- 🐍🛥🌟 Running Python in the browser with Batavia and Starlette☆12Sep 14, 2019Updated 6 years ago
- Terraform & Packer code to create an up-to-date Kali Linux AWS EC2 instance☆16Jul 1, 2019Updated 6 years ago
- novel high throughput entropy encoder for BWT data☆15Aug 10, 2022Updated 3 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- HSR OpenCL research project based on existing code.☆13Mar 29, 2016Updated 9 years ago
- Rebranded version of CSipSimple (pull-requests are welcome here)☆14Nov 8, 2016Updated 9 years ago
- Modified version of PULP Ara to support Vector Cryptography (Zvk) Instructions☆17Jan 21, 2026Updated 2 months ago
- We all know about the famous spyse.com this python3 scripts scrounges subdomains without the api from spyse cybersecurity search engine☆10May 13, 2020Updated 5 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆45Oct 29, 2023Updated 2 years ago