lmrs2 / secretgrindView external linksLinks
Secretgrind: a Valgrind analysis tool to detect secrets in memory
☆61Jan 16, 2017Updated 9 years ago
Alternatives and similar repositories for secretgrind
Users that are interested in secretgrind are comparing it to the libraries listed below
Sorting:
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Sep 23, 2021Updated 4 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆264May 30, 2025Updated 8 months ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- Python wrapper for http://nacl.cace-project.eu/☆30Nov 8, 2021Updated 4 years ago
- Tracks runtime instruction execution in Linux programs☆36Aug 25, 2013Updated 12 years ago
- QubesOS dom0 automation in Python☆12Aug 3, 2017Updated 8 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- A framework for control-flow recovery in binary programs.☆10Jul 11, 2018Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- An attempt to run a MirageOS unikernel, built with Solo5, running in Qemu, on a Raspberry Pi 3☆11Mar 12, 2016Updated 9 years ago
- ☆10Nov 6, 2018Updated 7 years ago
- Slide deck on running NetBSD on the SEGA Dreamcast☆11Apr 18, 2016Updated 9 years ago
- Notes relating to secure messaging☆19Jun 11, 2016Updated 9 years ago
- Off-The-Record Messaging protocol implementation for Python☆14Mar 19, 2025Updated 10 months ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Aug 23, 2016Updated 9 years ago
- Checking that functions are constant time with Valgrind☆196Feb 26, 2017Updated 8 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- Multi-input functional encryption☆12Feb 8, 2018Updated 8 years ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Repo for DTLS 1.3☆32Oct 20, 2025Updated 3 months ago
- Bootloader research tools (very much a work in progress)☆37Apr 5, 2019Updated 6 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- Generate a text graphic of Julia modules type tree.☆13Apr 4, 2014Updated 11 years ago
- Constant-Time Toolkit☆301Aug 29, 2018Updated 7 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- A place to discuss Private Measurement☆15Aug 8, 2023Updated 2 years ago
- A Python package that provides tools to integrate valgrind into your CI workflow☆22Dec 11, 2023Updated 2 years ago
- Qualcomm TrustZone kernel privilege escalation☆67Jun 15, 2016Updated 9 years ago
- Capability-based secure key management and credential storage☆120Mar 21, 2013Updated 12 years ago