Implementation of ECDAA
☆23Nov 10, 2017Updated 8 years ago
Alternatives and similar repositories for ecdaa
Users that are interested in ecdaa are comparing it to the libraries listed below
Sorting:
- A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabr…☆45Aug 13, 2021Updated 4 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- SmartCard U2F Adapter for macOS☆13Apr 11, 2020Updated 5 years ago
- A simple website for previewing WebAuthn attestations and assertions☆17Sep 30, 2025Updated 5 months ago
- c# FIDO2.CTAP library☆13Jan 21, 2022Updated 4 years ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 9 months ago
- Trainer(aimbot and esp) for Assault Cube on macOS☆22Oct 16, 2019Updated 6 years ago
- Online explorer for the FIDO Metadata Service☆27Updated this week
- Code samples that correctly check the remote server's SSL certificate☆24Feb 22, 2016Updated 10 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- Java fuzz testing library for implementations of ABNF rules such as IETF RFCs☆34Sep 26, 2024Updated last year
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- ☆11Sep 23, 2025Updated 5 months ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Intel Hex serializer in C#.☆11Jun 22, 2016Updated 9 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- JNI封装的底层加密实现,可跨平台使用☆11Jan 22, 2018Updated 8 years ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Easy Root Tool for Xperia devices based on the towelroot exploit☆10Jan 3, 2015Updated 11 years ago
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- Turn a string of hexadecimal characters into an `ArrayBuffer`☆10Jul 24, 2021Updated 4 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- 检测 模拟器 xposed root等☆11Feb 26, 2020Updated 6 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- ☆10Nov 6, 2018Updated 7 years ago
- ☆14Mar 8, 2018Updated 7 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- 📗 Documents of Linux ELF binary signature verification solution.☆11Nov 30, 2020Updated 5 years ago
- android native inject hook inlinehook☆12Oct 8, 2019Updated 6 years ago
- This is Android jni demo.☆11Apr 3, 2018Updated 7 years ago