google / paranoid_crypto
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆790Updated 10 months ago
Alternatives and similar repositories for paranoid_crypto:
Users that are interested in paranoid_crypto are comparing it to the libraries listed below
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆469Updated 3 months ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆677Updated 5 months ago
- Repository for information about 0-days exploited in-the-wild.☆779Updated last week
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆784Updated 4 months ago
- Open Source Package Analysis☆820Updated this week
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆530Updated 2 years ago
- Lightweight fuzzing of a memory snapshot using KVM☆449Updated 10 months ago
- Resources related to GitHub Security Lab☆1,449Updated last month
- ☆437Updated 6 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆273Updated 3 weeks ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,154Updated this week
- The TLS-Scanner Module from TLS-Attacker☆272Updated 3 weeks ago
- Quarkslab conference talks☆286Updated 3 weeks ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆609Updated 7 months ago
- OFRAK: unpack, modify, and repack binaries.☆1,930Updated 3 weeks ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆423Updated last year
- Credentials Dumper for Linux using eBPF☆1,132Updated 5 months ago
- A security focused static analysis tool for Android and Java applications.☆1,117Updated this week
- The xx file format. Turn your hex dumps into art, then into binary data.☆340Updated last year
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,525Updated this week
- Kernel exploitation technique☆570Updated last year
- A Course in Cryptanalysis☆137Updated 4 months ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆803Updated last year
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆454Updated 2 years ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆291Updated this week
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆887Updated 9 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆686Updated 4 months ago
- The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnera…☆1,336Updated this week
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 2 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,377Updated 7 months ago