keithjjones / pycryptotoolsLinks
A set of Python tools useful for cryptography and cryptanalysis.
☆15Updated 8 years ago
Alternatives and similar repositories for pycryptotools
Users that are interested in pycryptotools are comparing it to the libraries listed below
Sorting:
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Cryptanalysis and attack library☆23Updated 3 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Updated 2 years ago
- ARP Man-in-the-Middle tool☆30Updated 7 months ago
- Open YARA scan- and search engine☆24Updated 5 months ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆17Updated last year
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆13Updated 2 months ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- An official book about Rizin☆82Updated last month
- ☆10Updated 3 years ago
- Frida plugin for Binary Ninja☆18Updated 7 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 3 years ago
- ☆14Updated 7 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆45Updated last month
- Disassembly Generation and Processing for JARV1S☆16Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A Tamarin model and analysis of EMV☆33Updated 4 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Updated 8 years ago
- Docker Implementation for srsRANProject☆40Updated 2 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Updated 7 years ago
- Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur☆19Updated 3 years ago
- Blind Reverse Engineering a Wireless Protocol - or - Amateur Signals Intelligence☆22Updated 11 years ago
- ☆20Updated 11 years ago
- The public release of LeftoverLocals code☆67Updated last year
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆13Updated last year