google / paranoid_cryptoLinks
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
☆794Updated 2 months ago
Alternatives and similar repositories for paranoid_crypto
Users that are interested in paranoid_crypto are comparing it to the libraries listed below
Sorting:
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆498Updated 9 months ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆712Updated 2 months ago
- A Course in Cryptanalysis☆146Updated 10 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆291Updated last week
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.☆554Updated 2 months ago
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆532Updated 2 years ago
- A small collection of potentially useful contract templates☆403Updated 3 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,363Updated 7 months ago
- Trojan Source: Invisible Vulnerabilities☆1,265Updated 2 years ago
- ☆450Updated 2 years ago
- Semgrep queries developed by Trail of Bits.☆432Updated last month
- Open Source Package Analysis☆841Updated 4 months ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆355Updated 2 months ago
- Kernel exploitation technique☆577Updated last year
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- Private key usage verification☆430Updated 4 months ago
- CRY.ME (CRYptographic MEssaging application)☆169Updated 2 years ago
- Known attacks on Elliptic Curve Cryptography☆550Updated 9 months ago
- ☆326Updated 2 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆301Updated 7 months ago
- Hosting awesome cryptography CTF challenges from past CTFs☆120Updated 2 months ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆299Updated this week
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆623Updated 2 years ago
- Credentials Dumper for Linux using eBPF☆1,148Updated 11 months ago
- A community driven resource for learning CryptoGraphy☆66Updated 2 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆244Updated 2 years ago
- OFRAK: unpack, modify, and repack binaries.☆1,979Updated last week
- Repository for information about 0-days exploited in-the-wild.☆828Updated last month
- Testing Schnorr's factorization claim in Sage☆305Updated 3 years ago