google / paranoid_crypto
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆788Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for paranoid_crypto
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆458Updated last month
- Tool to find common vulnerabilities in cryptographic public keys☆256Updated 3 weeks ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆779Updated 2 years ago
- Open Source Package Analysis☆734Updated 3 weeks ago
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆766Updated 3 weeks ago
- Coverage-based fuzzer for python applications☆233Updated 2 years ago
- Quarkslab conference talks☆275Updated this week
- Lightweight fuzzing of a memory snapshot using KVM☆443Updated 7 months ago
- ☆441Updated 2 years ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆665Updated 2 months ago
- ☆429Updated 3 months ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆589Updated 4 months ago
- Credentials Dumper for Linux using eBPF☆1,116Updated 2 months ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆793Updated 9 months ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆286Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,027Updated last month
- ☆395Updated this week
- A Course in Cryptanalysis☆132Updated last month
- A security focused static analysis tool for Android and Java applications.☆1,099Updated this week
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,291Updated this week
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆875Updated 6 months ago
- A small collection of potentially useful contract templates☆380Updated 2 years ago
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆529Updated 2 years ago
- OFRAK: unpack, modify, and repack binaries.☆1,872Updated this week
- Semgrep queries developed by Trail of Bits.☆331Updated last week
- Trojan Source: Invisible Vulnerabilities☆1,246Updated last year
- ☆292Updated 3 months ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,669Updated last year
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆331Updated 8 months ago