hoeg / BleichenbacherSignatureForgerLinks
Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...
☆10Updated last year
Alternatives and similar repositories for BleichenbacherSignatureForger
Users that are interested in BleichenbacherSignatureForger are comparing it to the libraries listed below
Sorting:
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆178Updated 5 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Updated 5 years ago
- Factoring as a Service☆275Updated 6 months ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 8 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆401Updated 2 years ago
- Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.☆24Updated 7 years ago
- ☆238Updated last year
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Updated 6 years ago
- ☆170Updated 4 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Updated 4 years ago
- Pollard Rho attack on ECDLP with GMP☆10Updated 3 years ago
- Side-channel toolkit in Julia☆167Updated 4 years ago
- A tool for predicting the output of random number generators☆193Updated 8 years ago
- ☆153Updated 7 years ago
- ☆12Updated 6 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- Solutions to Matasano crypto challenges in Python 3.☆108Updated 2 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Updated 11 years ago
- RHme+ 2015 challenge☆115Updated 9 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆84Updated 11 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆647Updated 6 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Updated 2 months ago
- Build two PDFs that have different content but identical SHA1 sums.☆442Updated last year
- Repository with the material of the Tower of Hanoi introductory briefings on binary exploitation☆24Updated 10 years ago
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Updated 12 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- CTF writeups☆114Updated 8 years ago