☆171Mar 15, 2021Updated 4 years ago
Alternatives and similar repositories for cdf
Users that are interested in cdf are comparing it to the libraries listed below
Sorting:
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Mar 17, 2015Updated 10 years ago
- dude, is my code constant time?☆199Mar 19, 2024Updated last year
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Feb 9, 2018Updated 8 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- A MS OpenXML Format Fuzzing Framework☆84Apr 10, 2018Updated 7 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆2,993Updated this week
- Implements ristretto255, a fast prime-order group.☆110Feb 19, 2026Updated last week
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated 2 weeks ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Aug 27, 2018Updated 7 years ago
- A reversible DER and BER pretty-printer.☆248Oct 28, 2025Updated 4 months ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Nov 9, 2015Updated 10 years ago
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Jan 18, 2024Updated 2 years ago
- Checking that functions are constant time with Valgrind☆197Feb 26, 2017Updated 9 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆132Jul 25, 2017Updated 8 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- A C++ library for DANE protocols, focusing on secure email☆12Apr 18, 2017Updated 8 years ago
- Implementation of differential fuzz testing for TLS handshake messages☆11Jul 2, 2021Updated 4 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- Constant-Time Toolkit☆300Aug 29, 2018Updated 7 years ago
- Working through the Matasano Crypto Challenges (cryptopals.com)☆36Oct 23, 2014Updated 11 years ago
- DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers☆337Apr 30, 2022Updated 3 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Post-quantum cryptography certificates☆78Feb 10, 2026Updated 2 weeks ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,310Jan 6, 2026Updated last month
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- Nearly generic prime field implementation in Go☆24Feb 11, 2020Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Experiments in high-assurance crypto.☆50Dec 15, 2022Updated 3 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago