google / paranoid_crypto
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆793Updated last year
Alternatives and similar repositories for paranoid_crypto:
Users that are interested in paranoid_crypto are comparing it to the libraries listed below
- Tool to find common vulnerabilities in cryptographic public keys☆281Updated this week
- OFRAK: unpack, modify, and repack binaries.☆1,938Updated this week
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆478Updated 4 months ago
- ☆1,491Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆788Updated 2 years ago
- Open Source Package Analysis☆829Updated last week
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆684Updated 2 weeks ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,392Updated 9 months ago
- ☆323Updated last year
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆530Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,099Updated 6 months ago
- Known attacks on Elliptic Curve Cryptography☆511Updated 5 months ago
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,352Updated this week
- Repository for information about 0-days exploited in-the-wild.☆789Updated this week
- ☆444Updated 2 years ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆357Updated 4 months ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆620Updated 9 months ago
- Semgrep queries developed by Trail of Bits.☆398Updated this week
- A Course in Cryptanalysis☆144Updated 6 months ago
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆455Updated 2 years ago
- Trojan Source: Invisible Vulnerabilities☆1,260Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆435Updated last month
- Lightweight fuzzing of a memory snapshot using KVM☆453Updated last year
- Quarkslab conference talks☆295Updated 2 weeks ago
- A small collection of potentially useful contract templates☆387Updated 3 years ago
- Open Source Vulnerability schema.☆198Updated 2 weeks ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆339Updated last year
- Testing Schnorr's factorization claim in Sage☆302Updated 2 years ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,570Updated last week
- Kernel exploitation technique☆573Updated last year