Practical Keystroke Timing Attacks in Sandboxed JavaScript
☆31Jun 22, 2017Updated 8 years ago
Alternatives and similar repositories for interruptjs
Users that are interested in interruptjs are comparing it to the libraries listed below
Sorting:
- Eliminating Keystroke Timing Attacks☆22Dec 12, 2017Updated 8 years ago
- Fast implementation of php mt_rand using pyopencl and pycuda☆15Apr 16, 2020Updated 5 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 9 years ago
- Research code to perform AES timing attacks circa 2006☆15Feb 13, 2014Updated 12 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 8 years ago
- A simple threaded password bruteforce tool against Wordpress installations with XML-RPC enabled. The tool exploits the system.multicall f…☆19Dec 31, 2015Updated 10 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 3 months ago
- generates random values of standard, built-in JavaScript types for fuzz testing☆30Jan 27, 2021Updated 5 years ago
- ☆56Jan 25, 2016Updated 10 years ago
- Terraform module to deploy AWS ECS Fargate☆10May 15, 2025Updated 9 months ago
- ☆12Oct 6, 2025Updated 4 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆223Dec 24, 2021Updated 4 years ago
- Sample embedded defense code for applications written in .NET, Java, PHP and Python.☆11Feb 23, 2019Updated 7 years ago
- A tutorial that explains how to build a simple distributed fault-tolerant framework on top of Mesos☆47Oct 4, 2022Updated 3 years ago
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- A simple, interactive web tool to compare pricing and performance metrics of various AI models.☆16Feb 22, 2026Updated last week
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- hardware tools for the BayTrail (BYT) platform and other platforms☆11Sep 10, 2023Updated 2 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- A Clinic Bubbleprof example☆14Aug 21, 2020Updated 5 years ago
- Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept☆13Feb 4, 2018Updated 8 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 4 months ago
- ☆11Jul 22, 2018Updated 7 years ago
- AVR assembly plugin for Binary Ninja☆12Jun 6, 2018Updated 7 years ago
- A binaural beat generation toolkit.☆12Feb 11, 2020Updated 6 years ago
- A little lib for turning native-hdr-histograms to objects☆11Sep 9, 2020Updated 5 years ago
- Send text messages with Twilio. Easily.☆32Apr 15, 2011Updated 14 years ago
- A few demos on how the new portal API can be used with React.☆14Apr 19, 2018Updated 7 years ago
- Introduction to GSAP with example application☆13Aug 17, 2018Updated 7 years ago
- A presentation (in Markdown) for the IETF Hub Boston on June 12, 2018.☆11Sep 20, 2019Updated 6 years ago
- Go HackerOne API Client☆11May 16, 2024Updated last year
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 7 years ago
- ☆14May 7, 2015Updated 10 years ago
- A collection of Django middleware to help manage your caching setup.☆16Nov 22, 2012Updated 13 years ago