google / paranoid_cryptoLinks
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆799Updated 7 months ago
Alternatives and similar repositories for paranoid_crypto
Users that are interested in paranoid_crypto are comparing it to the libraries listed below
Sorting:
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆519Updated 2 months ago
- Open Source Package Analysis☆863Updated 9 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆310Updated this week
- A Course in Cryptanalysis☆149Updated last year
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆748Updated 4 months ago
- A small collection of potentially useful contract templates☆418Updated last month
- Trojan Source: Invisible Vulnerabilities☆1,276Updated 2 years ago
- Semgrep queries developed by Trail of Bits.☆471Updated 2 months ago
- ☆453Updated 3 years ago
- ☆329Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆795Updated 3 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆318Updated last year
- Lightweight fuzzing of a memory snapshot using KVM☆461Updated last year
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,475Updated last year
- A collection of my Semgrep rules to facilitate vulnerability research.☆779Updated 2 weeks ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,380Updated last year
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆922Updated last year
- Private key usage verification☆432Updated 10 months ago
- A curated list of resources about post-quantum cryptography.☆357Updated 5 months ago
- Repository for information about 0-days exploited in-the-wild.☆851Updated last month
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆304Updated 2 weeks ago
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆838Updated last month
- Coverage-based fuzzer for python applications☆237Updated 3 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆366Updated 7 months ago
- Testing Schnorr's factorization claim in Sage☆306Updated 3 years ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆381Updated last week
- Community Cryptography Specification Project☆512Updated 3 weeks ago
- Known attacks on Elliptic Curve Cryptography☆585Updated last year
- CRY.ME (CRYptographic MEssaging application)☆174Updated 2 months ago
- Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system…☆349Updated 3 months ago