mimoo / Diffie-Hellman_Backdoor
How to backdoor Diffie-Hellman
☆611Updated 8 years ago
Alternatives and similar repositories for Diffie-Hellman_Backdoor:
Users that are interested in Diffie-Hellman_Backdoor are comparing it to the libraries listed below
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- The DrK Attack - Proof of concept☆342Updated 2 years ago
- Sandboxed Execution Environment☆818Updated 4 years ago
- Sniffing browser history using HSTS☆936Updated 7 years ago
- A tool to help you write binary exploits☆607Updated 6 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆672Updated 2 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆276Updated 9 years ago
- - An Exploit Dev Swiss Army Knife.☆691Updated 3 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,098Updated 3 years ago
- A tool for predicting the output of random number generators☆190Updated 7 years ago
- All your IPs are belong to us.☆669Updated 6 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- Deprecated Binary Ninja prototype written in Python☆521Updated 4 years ago
- Teach you a binary exploitation for great good.☆293Updated 6 years ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- ROCA: Infineon RSA key vulnerability☆483Updated last year
- A list of publicly known but unfixed security bugs☆237Updated 6 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆282Updated 3 years ago
- ☆88Updated 9 years ago
- A Linux packet crafting tool.☆465Updated 4 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Population based metaheuristic for password cracking. Siga(Simple genetic algorithm)☆414Updated 7 years ago
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,415Updated 5 years ago
- Architectural privilege escalation on x86☆851Updated 6 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,254Updated 2 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆995Updated 3 years ago
- An intercepting proxy for web application testing☆410Updated 6 years ago
- A framework for BREACH and other compression-based crypto attacks☆228Updated 5 years ago