neuhalje / aes_padding_oracle_attackLinks
Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).
☆16Updated 10 years ago
Alternatives and similar repositories for aes_padding_oracle_attack
Users that are interested in aes_padding_oracle_attack are comparing it to the libraries listed below
Sorting:
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Copy of the contents at phrack.com☆40Updated 5 months ago
- Firmware analysis website + API☆43Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- hax 'n shit☆120Updated 10 years ago
- Vagrant files to bootstrap VM for CTFs☆11Updated 9 years ago
- DEScrypt CPU Collision Cracker☆50Updated 6 years ago
- ☆25Updated 4 years ago
- ☆20Updated 11 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- A fuzzing script for MitmProxy☆22Updated 10 years ago
- Certificate Fuzzer based on the work by Johannes Roth (cryptosource)☆13Updated 5 years ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆74Updated 6 years ago
- Telco training☆26Updated 6 years ago
- DEF CON 26 WorkShop - Fuzzing FTW☆20Updated 7 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 6 years ago
- ☆15Updated 8 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated 2 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 6 years ago
- Check for .net padding oracle patch☆19Updated 6 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆27Updated 6 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- Phishing Toolkit☆20Updated 7 years ago