jurajsomorovsky / EccPlaygroundLinks
Simple application for playing with elliptic curves
☆44Updated 3 years ago
Alternatives and similar repositories for EccPlayground
Users that are interested in EccPlayground are comparing it to the libraries listed below
Sorting:
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- ☆35Updated 13 years ago
- ☆25Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 9 years ago
- Code to fuzz bignum libraries☆46Updated 7 years ago
- lte security☆42Updated 10 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 9 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- free crypto audit☆31Updated 8 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- ☆17Updated 11 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38Updated 7 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆75Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- ☆170Updated 4 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 10 years ago
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Updated 4 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- CTF & practice exploit collection☆38Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- NASM Standard Library for shellcode☆69Updated 9 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Updated 9 years ago