How to backdoor Diffie-Hellman
☆615Aug 20, 2016Updated 9 years ago
Alternatives and similar repositories for Diffie-Hellman_Backdoor
Users that are interested in Diffie-Hellman_Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Apr 10, 2017Updated 9 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,128Dec 2, 2021Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆46Sep 8, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- attacking RSA via lattice reductions (LLL)☆832Apr 11, 2021Updated 5 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆871Updated this week
- Project Wycheproof tests crypto libraries against known attacks.☆3,033Updated this week
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- search key to restore petya encrypted mft☆612Apr 15, 2016Updated 10 years ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,068Aug 31, 2021Updated 4 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆74Jul 13, 2022Updated 3 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆342Aug 14, 2022Updated 3 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Oct 24, 2016Updated 9 years ago
- LLDB MCP Integration + other helpful commands☆750Mar 29, 2025Updated last year
- ☆11Nov 6, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆21Feb 1, 2016Updated 10 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆706May 13, 2022Updated 3 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆679Apr 10, 2024Updated 2 years ago
- SSL and TLS protocol test suite and fuzzer☆619Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆62Jan 16, 2017Updated 9 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,891Oct 23, 2020Updated 5 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Checking that functions are constant time with Valgrind☆200Feb 26, 2017Updated 9 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Jul 11, 2019Updated 6 years ago
- Course materials for Malware Analysis by RPISEC☆4,019Aug 26, 2022Updated 3 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 8 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The DrK Attack - Proof of concept☆348Mar 13, 2022Updated 4 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 10 years ago
- All your IPs are belong to us.☆676Jun 4, 2018Updated 7 years ago
- Private messaging system that hides metadata☆2,487Sep 12, 2019Updated 6 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 10 years ago
- A hacky debugger UI for hackers☆6,349Jan 30, 2025Updated last year
- Function redirection via ELF tricks.☆164Jun 30, 2015Updated 10 years ago