emilystamm / aes-ecb-attacksLinks
Simple attacks on AES-ECB
☆21Updated 4 years ago
Alternatives and similar repositories for aes-ecb-attacks
Users that are interested in aes-ecb-attacks are comparing it to the libraries listed below
Sorting:
- redpwn's challenge deployment system☆28Updated last year
- ☆33Updated 2 years ago
- A Tamarin model and analysis of EMV☆31Updated 4 years ago
- A tool to perform so called BGE attack☆24Updated last year
- ☆27Updated 2 years ago
- A collection of tools for the Janus exploit [CVE-2017-13156].☆10Updated 5 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Toolkit for creating cryptographic figures and videos.☆32Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- ☆23Updated 4 months ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆10Updated last year
- My writeups for some CTF I participated☆9Updated 3 years ago
- XSSPawn is a flexible and customizable visitor bot for CTF challenges setup; mostly used as a CTF XSS Bot. Based on CTFTraining's base_im…☆11Updated 8 months ago
- ☆48Updated last year
- Script for generating write-ups templates for CTF challenges 🗃️☆15Updated 3 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆12Updated 2 years ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆42Updated 9 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Simple CVE-2021-20294 poc☆11Updated 2 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Updated 4 years ago
- ☆13Updated 4 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 11 months ago
- TrustZone Trusted Application 0-Days by Design☆20Updated 3 weeks ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆50Updated 2 months ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 7 years ago
- Custom exploits☆26Updated last year
- A quick reference for understanding the nature and severity of vulnerabilities in TLS configurations and implementations.☆27Updated 5 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago