google / paranoid_crypto
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆788Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for paranoid_crypto
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆458Updated 2 weeks ago
- Credentials Dumper for Linux using eBPF☆1,115Updated 2 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆251Updated 2 weeks ago
- ☆425Updated 2 months ago
- Lightweight fuzzing of a memory snapshot using KVM☆440Updated 6 months ago
- Open Source Package Analysis☆730Updated last week
- Repository for information about 0-days exploited in-the-wild.☆758Updated last week
- A Course in Cryptanalysis☆131Updated 3 weeks ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆776Updated 2 years ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆666Updated last month
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆874Updated 5 months ago
- Fuzzing cryptographic libraries. Magic bug printer go brrrr.☆682Updated last week
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆760Updated last week
- Coverage-based fuzzer for python applications☆233Updated 2 years ago
- The FLARE team's open-source extension to add Python 3 scripting to Ghidra.☆696Updated 6 months ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆339Updated last year
- The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnera…☆1,225Updated this week
- A collection of my Semgrep rules to facilitate vulnerability research.☆587Updated 4 months ago
- Quarkslab conference talks☆274Updated last week
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,472Updated this week
- Open source vulnerability DB and triage service.☆1,529Updated this week
- Kernel exploitation technique☆566Updated 11 months ago
- Semgrep queries developed by Trail of Bits.☆329Updated 3 weeks ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆331Updated 7 months ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,773Updated 4 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,786Updated 7 months ago
- A Virtual FIDO2 USB Device☆1,206Updated 3 months ago
- OFRAK: unpack, modify, and repack binaries.☆1,870Updated last week
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆465Updated last year
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆611Updated this week