Secretgrind: a Valgrind analysis tool to detect secrets in memory
☆61Jan 16, 2017Updated 9 years ago
Alternatives and similar repositories for secretgrind
Users that are interested in secretgrind are comparing it to the libraries listed below
Sorting:
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆265May 30, 2025Updated 9 months ago
- "control-port-filter" without the bash☆14Jun 4, 2016Updated 9 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- Python wrapper for http://nacl.cace-project.eu/☆30Nov 8, 2021Updated 4 years ago
- Tracks runtime instruction execution in Linux programs☆36Aug 25, 2013Updated 12 years ago
- ☆10Nov 6, 2018Updated 7 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- ☆13Oct 31, 2017Updated 8 years ago
- code and manual for the defcon shoot 23 badge☆10Aug 10, 2015Updated 10 years ago
- An attempt to run a MirageOS unikernel, built with Solo5, running in Qemu, on a Raspberry Pi 3☆11Mar 12, 2016Updated 9 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Off-The-Record Messaging protocol implementation for Python☆14Mar 19, 2025Updated 11 months ago
- c2tool is meant to enable in-system programming on low pin-count Silicon Labs devices using the Silicon Labs 2-Wire Interface (C2).☆10Feb 4, 2019Updated 7 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Checking that functions are constant time with Valgrind☆197Feb 26, 2017Updated 9 years ago
- Random tools to perform Certificate Transparency-related stuff. Unmaintained and maybe broken☆27Feb 19, 2018Updated 8 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- Multi-input functional encryption☆12Feb 8, 2018Updated 8 years ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- A prototyping board for various RF components☆13Dec 7, 2024Updated last year
- Repo for DTLS 1.3☆32Oct 20, 2025Updated 4 months ago
- Bootloader research tools (very much a work in progress)☆37Apr 5, 2019Updated 6 years ago
- ☆19Feb 6, 2023Updated 3 years ago
- Simplified version of a common crawl fetcher☆17Dec 24, 2025Updated 2 months ago
- Generate a text graphic of Julia modules type tree.☆13Apr 4, 2014Updated 11 years ago
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Sep 29, 2021Updated 4 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago