jonathan-gramain / bitpunchLinks
Swiss Army knife for arbitrarily structured binary files
☆10Updated 6 years ago
Alternatives and similar repositories for bitpunch
Users that are interested in bitpunch are comparing it to the libraries listed below
Sorting:
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆38Updated 11 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- KaitaiFS: mount any filesystem specified with a .ksy as a real file system☆57Updated 2 years ago
- BitErrant☆59Updated 8 years ago
- tamper resistant audit log☆17Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆159Updated 6 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Parsing library for Tor-specific data formats.☆42Updated 2 years ago
- Fast TCP encryption☆245Updated 3 years ago
- an open source toolkit for PCI bus exploration☆72Updated 9 years ago
- Visual reverse engineering tool.☆284Updated 9 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆25Updated 9 years ago
- lots of performance (or lots of porn, if you prefer) httpd: Easy, chrooted, fast and simple to use HTTP server for static content. Runs …☆145Updated 6 years ago
- An implementation of the Salsa20 stream cipher in C99☆117Updated 9 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 11 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Updated 11 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 7 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- A binary format analysis tool☆243Updated 4 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Updated 8 years ago
- please use https://github.com/fireeye/vivisect instead☆16Updated 3 months ago
- Public collection of firewall dumps.☆44Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Updated 8 years ago
- stream encoding toolkit☆54Updated 10 years ago
- RESTful interface to your operating system shell☆19Updated 8 years ago
- A collection of crackmes☆41Updated last year
- Runtime Process Infection Made Easy☆188Updated last year