crocs-muni / roca
ROCA: Infineon RSA key vulnerability
☆486Updated last year
Alternatives and similar repositories for roca:
Users that are interested in roca are comparing it to the libraries listed below
- Detection script for the ROBOT vulnerability☆271Updated 2 years ago
- ☆170Updated 4 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆789Updated 3 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆835Updated this week
- Linux Memory Cryptographic Keys Extractor☆238Updated last year
- Private keys that have become public ...☆175Updated 3 weeks ago
- A framework for BREACH and other compression-based crypto attacks☆229Updated 5 years ago
- New TLS Padding Oracles☆125Updated last year
- Automated Linux evil maid attack☆426Updated 9 years ago
- Best Current Practices regarding secure online communication and configuration of services using cryptography.☆704Updated 3 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- a grep -r for secrets☆179Updated 3 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆458Updated last year
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆189Updated 6 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- A PGP packet visualizer☆178Updated 5 months ago
- Awesome Firmware Security & Other Helpful Documents☆593Updated 5 years ago
- XFLTReaT tunnelling framework☆328Updated 5 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆677Updated 2 years ago
- Memory-hard scheme Argon2☆204Updated 4 years ago
- free crypto audit☆31Updated 8 years ago
- The TLS-Scanner Module from TLS-Attacker☆274Updated last month
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆180Updated 7 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- A tool to fingerprint SSL/TLS servers☆269Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆521Updated 8 years ago
- ☆468Updated 5 months ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 6 years ago
- Reverse Engineering Page Table Caches in Your Processor☆368Updated 4 years ago