deeptechlabs / encryption
Encryption Algorithm Combined
☆26Updated 9 years ago
Alternatives and similar repositories for encryption
Users that are interested in encryption are comparing it to the libraries listed below
Sorting:
- Debugger and analyzer for ARM ELF executables.☆19Updated 2 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆14Updated 4 years ago
- ☆12Updated 5 years ago
- Example of an ELF parser to learn about the ELF format☆10Updated 7 months ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆36Updated 4 years ago
- A tool to perform so called BGE attack☆24Updated last year
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆30Updated 3 months ago
- AES-128 and DES differential fault analysis☆16Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆12Updated 3 years ago
- PPT of my talks.☆11Updated 2 weeks ago
- Kernel Cache Decryption for iOS☆14Updated 3 years ago
- Naive Proof of Concept Crypter for GNU/Linux ELF64☆11Updated 7 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆87Updated 6 years ago
- Solutions to https://cryptopals.com problems☆28Updated 3 weeks ago
- Inject libraries into 32 processes on macOS Mojave☆13Updated 5 years ago
- Simple proto parser with a gui☆19Updated 4 years ago
- ☆31Updated 4 years ago
- ManticoreUI support for Ghidra. This is primarily a prototype repository. See the main ManticoreUI repo (https://github.com/trailofbits/M…☆11Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆13Updated 4 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- Lepton is a Lightweight ELF Parsing Tool that was designed specifically for analyzing and editing binaries with damaged or corrupted ELF …☆35Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- Binary Ninja plugin to perform automated analysis of Windows drivers☆17Updated 5 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- ☆20Updated 5 years ago
- Comment rebasing for IDA Pro☆23Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆31Updated 2 weeks ago