isec-tugraz / interruptjsLinks
Practical Keystroke Timing Attacks in Sandboxed JavaScript
☆31Updated 8 years ago
Alternatives and similar repositories for interruptjs
Users that are interested in interruptjs are comparing it to the libraries listed below
Sorting:
- Differential fuzzing for the masses!☆153Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- DARPA Cyber Grand Challenge Documentation☆117Updated 8 years ago
- ☆152Updated 7 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 5 years ago
- afl-fuzz for javascript☆203Updated 8 years ago
- Sample application to let OpenSSL talk to itself (for fuzzing)☆34Updated 9 years ago
- An automated NFC fuzzing framework for Android devices.☆141Updated 4 years ago
- ☆91Updated last year
- ☆85Updated 5 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆112Updated 9 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆119Updated 8 years ago
- ☆90Updated 9 years ago
- A pip wrapper around AFL.☆86Updated 4 years ago
- Distributed Fuzzing for afl☆72Updated 10 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- A fuzzing management tools collection☆200Updated last week
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- An evolutionary knowledge-based fuzzer☆271Updated last year
- gramfuzz is a grammar-based fuzzer that lets one define complex grammars to generate text and binary data formats.☆259Updated 5 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Updated 7 years ago
- Seeding fuzzers with symbolic execution☆203Updated 8 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last month
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- ☆252Updated 5 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Dynamic security analysis of embedded systems’ firmwares☆83Updated 9 years ago
- Fuzzing results for various interpreters.☆82Updated 7 years ago