msotoodeh / WhiteBoxCryptoLinks
Whitebox implementation of AES and ARIA.
☆30Updated 4 years ago
Alternatives and similar repositories for WhiteBoxCrypto
Users that are interested in WhiteBoxCrypto are comparing it to the libraries listed below
Sorting:
- Whitebox AES☆53Updated 11 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- prototype of whitebox AES in C . Luo,Lai,You☆21Updated 9 years ago
- Whitebox AES implementation in Java. Chow scheme.☆95Updated last year
- Enable Virtualenv or Conda in IDAPython☆42Updated 4 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Implementations of white-box AES constructions and their cryptanalyses.☆218Updated 8 years ago
- Implementation for Chinese National Standard Ciphers☆43Updated 12 years ago
- Whitebox AES implementation in C++☆25Updated 5 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- Clone of the IDAPython repo☆24Updated 10 years ago
- C/C++ whitebox implementation of AES☆110Updated 6 years ago
- Qualcomm TrustZone kernel privilege escalation☆64Updated 9 years ago
- Run android with S2E☆32Updated 10 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- WBC AES implementation in C++ using Chow and Muir papers supporting 128, 192, 256, 512, 1024, 2048 and 4096-bit keys☆122Updated 4 years ago
- Git copy of idapython svn repo: https://code.google.com/p/idapython/☆49Updated 10 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Updated 8 years ago
- ☆43Updated 8 years ago
- IDA plugin CMake build-script☆37Updated 6 years ago
- A dynamic information flow tracing system for Android☆54Updated 4 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 9 years ago
- just an experiment☆21Updated 6 years ago
- 白盒密码学习的简单总结,包括论文,阅读笔记,相关的实现代码等。☆54Updated 4 years ago