ivansarno / IDEA-cipherLinks
IDEA cryptography algorithm
☆10Updated 5 years ago
Alternatives and similar repositories for IDEA-cipher
Users that are interested in IDEA-cipher are comparing it to the libraries listed below
Sorting:
- A Python implementation of the block cipher IDEA☆15Updated 8 years ago
- ☆41Updated 8 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 8 years ago
- ☆12Updated 4 years ago
- A repository with binaries for angr tests and examples.☆63Updated this week
- Use Intel Pin tools to analysis binary.☆38Updated 10 years ago
- ☆44Updated 5 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 7 years ago
- TracerX Symbolic Virtual Machine☆32Updated 4 months ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 4 years ago
- A version of Griffin used to provide program traces☆15Updated 5 years ago
- PARTS / LLVM compiler☆31Updated 6 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Updated 5 years ago
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- MCFI/PICFI tool chain☆45Updated last year
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 11 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Updated 7 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 7 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Updated 3 years ago
- ☆53Updated 6 years ago
- LLVM dataflow analysis framework; Reaching Definition Analysis; Liveness Analysis, May-point-to Definition Analysis ; inter-procedural m…☆26Updated 5 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Updated 9 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Updated 5 years ago
- This is the source of our Return Oriented Programming tool.☆14Updated 6 years ago
- ☆18Updated 2 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- DES algorithm implementation in C☆79Updated 5 years ago
- Securing System Logs With Intel SGX☆16Updated 8 years ago