emilyfane / aes-ecb-attacksLinks
Simple attacks on AES-ECB
☆22Updated 4 years ago
Alternatives and similar repositories for aes-ecb-attacks
Users that are interested in aes-ecb-attacks are comparing it to the libraries listed below
Sorting:
- A Tamarin model and analysis of EMV☆35Updated 4 years ago
- Solutions to https://cryptopals.com problems☆28Updated 5 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Write ups for Ph0wn CTF☆47Updated 2 months ago
- ☆33Updated 2 years ago
- ☆31Updated 2 years ago
- Decompress Xamarin .NET compressed binaries so they can be decompiled.☆48Updated 5 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Updated 2 years ago
- ☆26Updated 3 years ago
- A collection of tools for the Janus exploit [CVE-2017-13156].☆10Updated 5 years ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆46Updated last year
- A tool to perform so called BGE attack☆25Updated 4 months ago
- Binary Golf Grand Prix☆62Updated 7 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- Research tools developed for Intel Wi-Fi chips☆56Updated 4 months ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Updated 5 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- ☆51Updated last year
- TrustZone Trusted Application 0-Days by Design☆24Updated 5 months ago
- Still point in moving world.☆50Updated 3 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆131Updated last year
- frown (frida-own) – an instrumentation challenge☆25Updated last year
- Toolkit for creating cryptographic figures and videos.☆34Updated last year
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆73Updated last year
- MQTT exploit and Pentesting guide for penetration tester☆19Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆119Updated 11 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 8 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago