kholia / passe-partout
passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-partout@hsc.fr).
☆63Updated 7 years ago
Alternatives and similar repositories for passe-partout:
Users that are interested in passe-partout are comparing it to the libraries listed below
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- lte security☆41Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Does your library check TLS certificates properly?☆78Updated last year
- free crypto audit☆31Updated 7 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- ☆17Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- ☆30Updated 9 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- ☆112Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆63Updated 7 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆102Updated 4 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago