google / paranoid_cryptoLinks
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆794Updated this week
Alternatives and similar repositories for paranoid_crypto
Users that are interested in paranoid_crypto are comparing it to the libraries listed below
Sorting:
- Lightweight fuzzing of a memory snapshot using KVM☆452Updated last year
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆491Updated 6 months ago
- Semgrep queries developed by Trail of Bits.☆410Updated last week
- Open Source Package Analysis☆834Updated 2 months ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆697Updated 2 weeks ago
- Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system…☆329Updated 2 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆286Updated 3 weeks ago
- A small collection of potentially useful contract templates☆399Updated 3 weeks ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,351Updated 4 months ago
- ☆452Updated this week
- Coverage-based fuzzer for python applications☆236Updated 2 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆904Updated last year
- OSV-SCALIBR: A library for Software Composition Analysis☆348Updated this week
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆790Updated 2 years ago
- The TLS-Scanner Module from TLS-Attacker☆275Updated last week
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆295Updated this week
- ☆293Updated 10 months ago
- OFRAK: unpack, modify, and repack binaries.☆1,958Updated this week
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆532Updated 2 years ago
- #supply #chain #attack #detection☆527Updated this week
- Credentials Dumper for Linux using eBPF☆1,143Updated 9 months ago
- A Course in Cryptanalysis☆144Updated 8 months ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,412Updated 11 months ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆363Updated 6 months ago
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆752Updated this week
- A security focused static analysis tool for Android and Java applications.☆1,150Updated this week
- A collection of my Semgrep rules to facilitate vulnerability research.☆645Updated last month
- Trojan Source: Invisible Vulnerabilities☆1,264Updated 2 years ago
- Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.☆542Updated last week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,121Updated 8 months ago