google / paranoid_cryptoLinks
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆795Updated last month
Alternatives and similar repositories for paranoid_crypto
Users that are interested in paranoid_crypto are comparing it to the libraries listed below
Sorting:
- A Course in Cryptanalysis☆144Updated 9 months ago
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆493Updated 8 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆285Updated last month
- Open Source Package Analysis☆836Updated 3 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- ☆324Updated last year
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆705Updated 2 months ago
- A small collection of potentially useful contract templates☆402Updated 2 months ago
- ☆450Updated 2 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- Semgrep queries developed by Trail of Bits.☆423Updated 3 weeks ago
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆532Updated 2 years ago
- OFRAK: unpack, modify, and repack binaries.☆1,970Updated this week
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆95Updated this week
- A collection of my Semgrep rules to facilitate vulnerability research.☆660Updated 2 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,360Updated 6 months ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆297Updated this week
- Kernel exploitation technique☆577Updated last year
- Known attacks on Elliptic Curve Cryptography☆544Updated 9 months ago
- Community Cryptography Specification Project☆423Updated last week
- Credentials Dumper for Linux using eBPF☆1,147Updated 11 months ago
- Lightweight fuzzing of a memory snapshot using KVM☆458Updated last year
- Private key usage verification☆430Updated 4 months ago
- Testing Schnorr's factorization claim in Sage☆305Updated 2 years ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆815Updated last year
- A Python pickling decompiler and static analyzer☆533Updated last month
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆778Updated 2 weeks ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆443Updated 4 months ago
- Fully dockerized Linux kernel debugging environment☆754Updated 10 months ago
- A curated list of resources about post-quantum cryptography.☆324Updated 2 months ago