How to backdoor Diffie-Hellman
☆613Aug 20, 2016Updated 9 years ago
Alternatives and similar repositories for Diffie-Hellman_Backdoor
Users that are interested in Diffie-Hellman_Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Apr 10, 2017Updated 8 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,121Dec 2, 2021Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Timing Attack on TLS' ECDSA signature☆47Sep 8, 2015Updated 10 years ago
- attacking RSA via lattice reductions (LLL)☆833Apr 11, 2021Updated 4 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated last month
- Project Wycheproof tests crypto libraries against known attacks.☆3,002Updated this week
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,064Aug 31, 2021Updated 4 years ago
- search key to restore petya encrypted mft☆612Apr 15, 2016Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Oct 24, 2016Updated 9 years ago
- LLDB MCP Integration + other helpful commands☆742Mar 29, 2025Updated 11 months ago
- ☆11Nov 6, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆701May 13, 2022Updated 3 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆677Apr 10, 2024Updated last year
- SSL and TLS protocol test suite and fuzzer☆617Updated this week
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆62Jan 16, 2017Updated 9 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,892Oct 23, 2020Updated 5 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Checking that functions are constant time with Valgrind☆198Feb 26, 2017Updated 9 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Jul 11, 2019Updated 6 years ago
- Course materials for Malware Analysis by RPISEC☆4,004Aug 26, 2022Updated 3 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- The DrK Attack - Proof of concept☆348Mar 13, 2022Updated 4 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 9 years ago
- All your IPs are belong to us.☆676Jun 4, 2018Updated 7 years ago
- Private messaging system that hides metadata☆2,486Sep 12, 2019Updated 6 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- A hacky debugger UI for hackers☆6,355Jan 30, 2025Updated last year