mimoo / whiteboxDESLinks
a whiteboxed DES implementation based on Chow et al paper
☆30Updated 10 years ago
Alternatives and similar repositories for whiteboxDES
Users that are interested in whiteboxDES are comparing it to the libraries listed below
Sorting:
- prototype of whitebox AES in C . Luo,Lai,You☆21Updated 9 years ago
- Whitebox AES☆53Updated 11 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆12Updated 5 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆50Updated 2 years ago
- Recover control flow graph from obfuscated codes☆38Updated 9 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- ☆31Updated 9 years ago
- Linux hooking engine for ARM architecture☆16Updated 10 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Updated 8 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 5 years ago
- ☆43Updated 8 years ago
- A dynamic information flow tracing system for Android☆54Updated 4 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- Tool to view heap chunks and memory writes (using pintool)☆40Updated 6 years ago
- ELF obfuscator☆68Updated 9 years ago
- ☆16Updated 6 years ago
- Original code about binary encryption from phrack☆71Updated 13 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆43Updated 5 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 9 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- Futile attempt to solve the Tigress challenges using angr☆23Updated 6 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 9 years ago