mimoo / Diffie-Hellman_Backdoor
How to backdoor Diffie-Hellman
☆612Updated 8 years ago
Alternatives and similar repositories for Diffie-Hellman_Backdoor:
Users that are interested in Diffie-Hellman_Backdoor are comparing it to the libraries listed below
- The DrK Attack - Proof of concept☆344Updated 3 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆675Updated 2 years ago
- LLDB MCP Integration + other helpful commands☆709Updated 2 weeks ago
- All your IPs are belong to us.☆669Updated 6 years ago
- Deprecated Binary Ninja prototype written in Python☆523Updated 4 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,102Updated 3 years ago
- Sandboxed Execution Environment☆819Updated 4 years ago
- Teach you a binary exploitation for great good.☆292Updated 6 years ago
- A tool to help you write binary exploits☆609Updated 6 years ago
- Sniffing browser history using HSTS☆936Updated 7 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆301Updated 3 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- A public database for software and firmware hashes☆214Updated 8 years ago
- ☆88Updated 9 years ago
- A list of publicly known but unfixed security bugs☆237Updated 7 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆430Updated 2 months ago
- Proof of concept for CVE-2015-7547☆543Updated 9 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆282Updated 3 years ago
- search key to restore petya encrypted mft☆614Updated 9 years ago
- A tool for predicting the output of random number generators☆191Updated 7 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆654Updated 4 months ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆274Updated 9 years ago
- A libre cross-platform disassembler.☆1,442Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- Architectural privilege escalation on x86☆854Updated 7 years ago
- Factoring as a Service☆263Updated 2 years ago
- Population based metaheuristic for password cracking. Siga(Simple genetic algorithm)☆413Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆285Updated 8 years ago