isec-tugraz / interruptjsLinks
Practical Keystroke Timing Attacks in Sandboxed JavaScript
☆31Updated 8 years ago
Alternatives and similar repositories for interruptjs
Users that are interested in interruptjs are comparing it to the libraries listed below
Sorting:
- ☆149Updated 6 years ago
- DARPA Cyber Grand Challenge Documentation☆116Updated 8 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 5 years ago
- Differential fuzzing for the masses!☆153Updated 8 years ago
- Sample application to let OpenSSL talk to itself (for fuzzing)☆34Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆45Updated 9 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆112Updated 9 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
- A pip wrapper around AFL.☆88Updated 4 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆119Updated 8 years ago
- ☆76Updated last year
- gramfuzz is a grammar-based fuzzer that lets one define complex grammars to generate text and binary data formats.☆257Updated 4 years ago
- DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers☆336Updated 3 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆79Updated 8 years ago
- This repository contains examples of Flush+Flush cache attacks☆164Updated 3 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆162Updated 3 years ago
- A linux system call fuzzer using TriforceAFL☆177Updated last year
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- A fuzzing framework for network servers☆120Updated 6 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- ☆89Updated last year
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- ☆159Updated 10 years ago