How to backdoor Diffie-Hellman
☆613Aug 20, 2016Updated 9 years ago
Alternatives and similar repositories for Diffie-Hellman_Backdoor
Users that are interested in Diffie-Hellman_Backdoor are comparing it to the libraries listed below
Sorting:
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,117Dec 2, 2021Updated 4 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆47Sep 8, 2015Updated 10 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Apr 10, 2017Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated 2 weeks ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- attacking RSA via lattice reductions (LLL)☆830Apr 11, 2021Updated 4 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆2,993Feb 25, 2026Updated last week
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,063Aug 31, 2021Updated 4 years ago
- search key to restore petya encrypted mft☆612Apr 15, 2016Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- LLDB MCP Integration + other helpful commands☆740Mar 29, 2025Updated 11 months ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆700May 13, 2022Updated 3 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆673Apr 10, 2024Updated last year
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- SSL and TLS protocol test suite and fuzzer☆615Updated this week
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆345Aug 14, 2022Updated 3 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- The DrK Attack - Proof of concept☆347Mar 13, 2022Updated 3 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Metaphor - Stagefright with ASLR bypass☆317Mar 24, 2016Updated 9 years ago
- Course materials for Malware Analysis by RPISEC☆4,002Aug 26, 2022Updated 3 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Sandboxed Execution Environment☆819Oct 5, 2020Updated 5 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,895Oct 23, 2020Updated 5 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Jan 16, 2017Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Dec 11, 2020Updated 5 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Nov 19, 2025Updated 3 months ago
- All your IPs are belong to us.☆676Jun 4, 2018Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago