cr-marcstevens / sha1_gpu_nearcollisionattacksLinks
GPU code for the first SHA-1 collision attack and two freestart attacks
☆34Updated 3 years ago
Alternatives and similar repositories for sha1_gpu_nearcollisionattacks
Users that are interested in sha1_gpu_nearcollisionattacks are comparing it to the libraries listed below
Sorting:
- White-box Analysis and Implementation Tools☆75Updated 3 years ago
- ☆11Updated 5 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆76Updated 6 years ago
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- A tool to perform so called BGE attack☆25Updated 3 months ago
- ☆20Updated 5 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆45Updated 6 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆67Updated 8 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- ☆42Updated 8 years ago
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆84Updated 8 months ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Function signature matching and signature generation plugin for Binary Ninja☆75Updated last year
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 2 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- White-box Design and Analysis kit☆24Updated 2 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- RetDec Offline Decompiler☆45Updated 5 years ago
- ☆74Updated 7 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- The CRISPR static binary patcher☆37Updated 4 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆28Updated 7 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated 2 years ago