crocs-muni / roca
ROCA: Infineon RSA key vulnerability
☆483Updated last year
Alternatives and similar repositories for roca:
Users that are interested in roca are comparing it to the libraries listed below
- Detection script for the ROBOT vulnerability☆268Updated 2 years ago
- Linux Memory Cryptographic Keys Extractor☆237Updated last year
- New TLS Padding Oracles☆125Updated last year
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆826Updated last month
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- ☆170Updated 3 years ago
- A framework for BREACH and other compression-based crypto attacks☆228Updated 5 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- INTERLOCK - file encryption and HSM front-end☆299Updated last month
- a grep -r for secrets☆178Updated 2 years ago
- How to backdoor Diffie-Hellman☆611Updated 8 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆188Updated 6 years ago
- Various PoCs☆490Updated 5 years ago
- Private keys that have become public ...☆173Updated last week
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆836Updated last month
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆790Updated 3 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆127Updated 3 weeks ago
- Current development of SSLyze now takes place on a separate repository☆644Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 7 years ago
- Best Current Practices regarding secure online communication and configuration of services using cryptography.☆704Updated 3 years ago
- ☆378Updated 12 years ago
- XFLTReaT tunnelling framework☆327Updated 5 years ago
- A tool to fingerprint SSL/TLS servers☆268Updated 3 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- The modular distributed fingerprinting engine☆224Updated 6 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- NTP Main-in-the-Middle tool☆244Updated 2 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆301Updated 3 years ago
- Local Privilege Escalation☆206Updated 8 years ago