cr-marcstevens / sha1_gpu_nearcollisionattacksLinks
GPU code for the first SHA-1 collision attack and two freestart attacks
☆34Updated 3 years ago
Alternatives and similar repositories for sha1_gpu_nearcollisionattacks
Users that are interested in sha1_gpu_nearcollisionattacks are comparing it to the libraries listed below
Sorting:
- ☆20Updated 5 years ago
- White-box Analysis and Implementation Tools☆75Updated 3 years ago
- ☆11Updated 5 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆75Updated 6 years ago
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆37Updated 4 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Updated 11 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- RetDec Offline Decompiler☆45Updated 5 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Updated 8 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- The CRISPR static binary patcher☆37Updated 4 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆31Updated 6 years ago
- ☆74Updated 7 years ago
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆84Updated 7 months ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆45Updated 6 years ago
- Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.☆21Updated 4 years ago
- Hex-Rays MicrocodeExplorer☆29Updated 4 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- Detect patterns of bad behavior in function calls☆26Updated 5 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- The rev.ng demos☆11Updated 3 weeks ago
- Diablo is a retargetable link-time binary rewriting framework☆79Updated 4 years ago
- Function signature matching and signature generation plugin for Binary Ninja☆75Updated 11 months ago
- ☆24Updated last year
- White-box Design and Analysis kit☆24Updated 2 years ago
- Symbol REPL☆31Updated 7 years ago