kholia / passe-partout
passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-partout@hsc.fr).
☆62Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for passe-partout
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Does your library check TLS certificates properly?☆78Updated last year
- setroubleshootd xSports☆92Updated 7 years ago
- ☆17Updated 7 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆76Updated 4 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆102Updated 3 years ago
- ssltrace hooks an application's SSL libraries to record keying data of all SSL connections☆93Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆70Updated 8 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆67Updated 10 years ago
- an open source toolkit for PCI bus exploration☆70Updated 7 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- ☆30Updated 9 years ago
- lte security☆41Updated 9 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 9 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- ☆30Updated 13 years ago
- Little bit of this, little bit of that☆89Updated 7 months ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- ☆111Updated 7 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 9 years ago
- free crypto audit☆31Updated 7 years ago
- CVE assignment documentation☆75Updated 8 years ago