cr-marcstevens / sha1_gpu_nearcollisionattacksLinks
GPU code for the first SHA-1 collision attack and two freestart attacks
☆34Updated 3 years ago
Alternatives and similar repositories for sha1_gpu_nearcollisionattacks
Users that are interested in sha1_gpu_nearcollisionattacks are comparing it to the libraries listed below
Sorting:
- ☆12Updated 5 years ago
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- ☆20Updated 5 years ago
- Hex-Rays MicrocodeExplorer☆29Updated 4 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- RetDec Offline Decompiler☆45Updated 5 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆74Updated 6 years ago
- White-box Design and Analysis kit☆24Updated 2 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- Conference Presentations☆44Updated 5 years ago
- Differential fault analysis framework for AES128☆49Updated 11 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 6 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- A tool to perform so called BGE attack☆24Updated last month
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆45Updated 6 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Updated 8 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆145Updated 4 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆58Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- ☆74Updated 7 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- Encryption Algorithm Combined☆27Updated 9 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Updated 11 years ago
- Dynamic binary translator for x86 binaries☆37Updated 2 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Binary Ninja Syscall Annotator☆45Updated 3 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last month