keithjjones / pycryptotools
A set of Python tools useful for cryptography and cryptanalysis.
☆13Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for pycryptotools
- Cryptanalysis and attack library☆22Updated 2 years ago
- ARP Man-in-the-Middle tool☆27Updated last month
- Open YARA scan- and search engine☆16Updated this week
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago
- Disassembly Generation and Processing for JARV1S☆13Updated 3 months ago
- Read only mirror - No pull requests☆18Updated 3 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 6 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆26Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆10Updated 10 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- ☆13Updated 4 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆22Updated 2 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆42Updated 9 months ago
- CITL's static analysis engine for native code artifacts☆20Updated 3 years ago
- Some guides about general topics on information security☆12Updated 5 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Updated 7 years ago
- Network Tools☆32Updated 11 months ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 6 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Updated last year
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- Upload external IP so you can find your devices elsewhere☆15Updated 7 months ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆11Updated 2 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆9Updated last year
- Word split utility☆13Updated 6 years ago