google / paranoid_cryptoLinks
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆796Updated 5 months ago
Alternatives and similar repositories for paranoid_crypto
Users that are interested in paranoid_crypto are comparing it to the libraries listed below
Sorting:
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆512Updated last week
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆734Updated 3 months ago
- A Course in Cryptanalysis☆148Updated last year
- Open Source Package Analysis☆857Updated 7 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆303Updated last week
- Semgrep queries developed by Trail of Bits.☆453Updated last month
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆796Updated 3 years ago
- A small collection of potentially useful contract templates☆412Updated 6 months ago
- CRY.ME (CRYptographic MEssaging application)☆173Updated 2 weeks ago
- ☆454Updated 3 years ago
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆531Updated 3 years ago
- ☆327Updated 2 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆125Updated 5 months ago
- Private key usage verification☆433Updated 8 months ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆99Updated 2 months ago
- Repository for information about 0-days exploited in-the-wild.☆842Updated 2 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆589Updated 2 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,372Updated 10 months ago
- Known attacks on Elliptic Curve Cryptography☆575Updated last year
- Coverage-based fuzzer for python applications☆237Updated 3 years ago
- Trojan Source: Invisible Vulnerabilities☆1,271Updated 2 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆755Updated this week
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆828Updated 2 months ago
- Lightweight fuzzing of a memory snapshot using KVM☆461Updated last year
- ☆1,505Updated 3 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆920Updated last year
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆302Updated last week
- Kernel exploitation technique☆579Updated 2 years ago
- The TLS-Scanner Module from TLS-Attacker☆280Updated 2 months ago