How to backdoor Diffie-Hellman
☆613Aug 20, 2016Updated 9 years ago
Alternatives and similar repositories for Diffie-Hellman_Backdoor
Users that are interested in Diffie-Hellman_Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Apr 10, 2017Updated 9 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,128Dec 2, 2021Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Timing Attack on TLS' ECDSA signature☆46Sep 8, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- attacking RSA via lattice reductions (LLL)☆832Apr 11, 2021Updated 5 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆868Feb 12, 2026Updated 2 months ago
- Project Wycheproof tests crypto libraries against known attacks.☆3,015Apr 7, 2026Updated last week
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,065Aug 31, 2021Updated 4 years ago
- search key to restore petya encrypted mft☆612Apr 15, 2016Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆74Jul 13, 2022Updated 3 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Oct 24, 2016Updated 9 years ago
- LLDB MCP Integration + other helpful commands☆745Mar 29, 2025Updated last year
- ☆11Nov 6, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆703May 13, 2022Updated 3 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆678Apr 10, 2024Updated 2 years ago
- SSL and TLS protocol test suite and fuzzer☆615Mar 30, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆62Jan 16, 2017Updated 9 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,891Oct 23, 2020Updated 5 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Checking that functions are constant time with Valgrind☆200Feb 26, 2017Updated 9 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Jul 11, 2019Updated 6 years ago
- Course materials for Malware Analysis by RPISEC☆4,010Aug 26, 2022Updated 3 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆44Aug 9, 2017Updated 8 years ago
- The DrK Attack - Proof of concept☆348Mar 13, 2022Updated 4 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 10 years ago
- All your IPs are belong to us.☆677Jun 4, 2018Updated 7 years ago
- Private messaging system that hides metadata☆2,487Sep 12, 2019Updated 6 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- A hacky debugger UI for hackers☆6,348Jan 30, 2025Updated last year