Automatic Identification of Cryptographic Primitives in Software
☆32Mar 14, 2015Updated 11 years ago
Alternatives and similar repositories for kerckhoffs
Users that are interested in kerckhoffs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- ☆58Oct 15, 2020Updated 5 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago
- ☆90Jul 5, 2016Updated 9 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- A hacky clang analyzer checker that looks for potentially exploitable kernel integer overflows.☆20May 13, 2018Updated 7 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Benchmark apps for static analyzing native world of Android applications.☆13Nov 15, 2018Updated 7 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- suite of binaries used to test function identification☆28Nov 7, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- Python interface for Apple Keynote 09 files☆18May 22, 2016Updated 9 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- A prototype system call fuzzer.☆14Apr 16, 2017Updated 8 years ago
- Software Analysis and Verification Group☆15Nov 11, 2025Updated 4 months ago
- ☆22Aug 29, 2023Updated 2 years ago
- A curated list of Hardware Hacking resources☆12Apr 14, 2020Updated 5 years ago
- Secure Computation Utilities☆17Mar 5, 2026Updated 3 weeks ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Concurrency Bug Vulnerability Analysis☆12Sep 4, 2017Updated 8 years ago
- Static Cross-Entry UAF Detector☆24Apr 28, 2025Updated 11 months ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- Wrapper for borgbackup to easily use in code☆19Feb 4, 2026Updated last month
- Run fuzzing experiments in Docker☆32Mar 17, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆16Jun 21, 2024Updated last year
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆87Mar 17, 2026Updated last week
- A set of pdf documents used during the fuzzing process☆22Apr 27, 2017Updated 8 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆33Feb 5, 2019Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- ☆27Jan 27, 2017Updated 9 years ago