Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the data can be configured for multiple testing scenarios.
☆14Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for CryptoStreams
Users that are interested in CryptoStreams are comparing it to the libraries listed below
Sorting:
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 2 weeks ago
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Jun 20, 2024Updated last year
- Tool for analysis of security certificates and their security targets (Common Criteria, NIST FIPS140-2...).☆24Updated this week
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆85Feb 12, 2026Updated 2 weeks ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Jun 4, 2017Updated 8 years ago
- JavaCard project template for building CAP and running JCardSim with gradle + coverage☆19Mar 24, 2024Updated last year
- Randomness testing toolkit automates running and evaluating statistical testing batteries☆18Feb 16, 2024Updated 2 years ago
- A fuzzer for APDU-based smartcard interfaces☆21Mar 16, 2025Updated 11 months ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated 3 weeks ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- This repository contains the source code of the OWASP TOP 10 NodeJS Panel I have used☆10Nov 20, 2022Updated 3 years ago
- ☆10Sep 10, 2025Updated 5 months ago
- Python library for Alphanov's PDM laser sources control☆13Updated this week
- ☆10Jan 24, 2024Updated 2 years ago
- Files and Links from Go Hack Yourself book and course☆14Feb 11, 2026Updated 2 weeks ago
- Spacehuhn Wiki Source☆13Apr 27, 2023Updated 2 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- gcnano-binaries☆11Feb 9, 2026Updated 3 weeks ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Nov 25, 2019Updated 6 years ago
- ☆38Mar 20, 2017Updated 8 years ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- A GreaseMonkey script to allow you to overwrite and delete your Reddit comments in bulk☆12Dec 13, 2019Updated 6 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- volby.digital☆11Apr 30, 2024Updated last year
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- Create an OpenVPN server on a VPS using vagrant.☆10May 29, 2019Updated 6 years ago
- Export files for GlobalPlatform APIs☆12Sep 30, 2020Updated 5 years ago
- Programmers Editor that grows with you☆12Jan 16, 2025Updated last year
- Load testing helper for Node.JS☆71Jun 16, 2024Updated last year
- GOST-34.11-2012 (Stribog) hash-function☆11May 12, 2015Updated 10 years ago
- Urho3D extra minimal examples and demos. Tested in Ubuntu 18.04.☆11Feb 25, 2022Updated 4 years ago
- ☆11Jun 2, 2015Updated 10 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- ☆11Jul 15, 2021Updated 4 years ago
- Country information for a given IP address.☆11Mar 22, 2015Updated 10 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago