ilchen / cryptopalsLinks
Solutions to https://cryptopals.com problems
☆28Updated last month
Alternatives and similar repositories for cryptopals
Users that are interested in cryptopals are comparing it to the libraries listed below
Sorting:
- A tool to perform so called BGE attack☆24Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- ☆13Updated 4 years ago
- ☆12Updated 5 years ago
- TrustZone Trusted Application 0-Days by Design☆20Updated 3 weeks ago
- ☆26Updated 4 months ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Pickle decompiler plugin for Radare2☆18Updated last year
- ☆20Updated 3 years ago
- Use Ghidra Structs in Python☆29Updated 4 years ago
- ☆20Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 4 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- White-box Design and Analysis kit☆24Updated 2 years ago
- A Tamarin model and analysis of EMV☆31Updated 4 years ago
- Some tee/trustzone helper stuff☆53Updated 5 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- ☆66Updated 5 years ago
- ☆31Updated last month
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- A repository with UEFI research stuff☆15Updated last year
- PoC for PixieFail vulnerabilities☆23Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Files used for reproducing Fuzzware's experiments☆57Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- RetroFuzz is a fuzzer for SEGA Genesis emulators☆9Updated 5 years ago
- ☆12Updated 4 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago