cr-marcstevens / sha1_gpu_nearcollisionattacksLinks
GPU code for the first SHA-1 collision attack and two freestart attacks
☆36Updated 3 years ago
Alternatives and similar repositories for sha1_gpu_nearcollisionattacks
Users that are interested in sha1_gpu_nearcollisionattacks are comparing it to the libraries listed below
Sorting:
- White-box Analysis and Implementation Tools☆77Updated 3 years ago
- ☆12Updated 6 years ago
- ☆20Updated 6 years ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆46Updated 6 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆77Updated 6 years ago
- Thunderclap QEMU-based network card emulation☆29Updated 3 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- Docker files for Miasm☆17Updated 7 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆83Updated 11 months ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- RetDec Offline Decompiler☆46Updated 5 years ago
- ☆42Updated 8 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 4 years ago
- ROP gadget finder and analysis in pure Javascript☆27Updated 3 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Updated 8 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Check a Windows PE file for some basic security flags☆12Updated 10 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆37Updated 5 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆163Updated 3 years ago
- REIL translation library☆36Updated 9 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago