ozgurozmen / IoD-Crypt
Lightweight Cryptographic Framework for Internet of Drones
☆17Updated 6 years ago
Alternatives and similar repositories for IoD-Crypt:
Users that are interested in IoD-Crypt are comparing it to the libraries listed below
- EBNF data generator☆17Updated this week
- Old coverage-guided fuzz testing for fxamacker/cbor. A newer version is used by fxamacker/cbor for fuzzing.☆11Updated last year
- Stupid crypto tricks☆18Updated 3 years ago
- symbolic reachability checker☆23Updated 3 years ago
- A sleep-aware-sleep() function☆12Updated 2 months ago
- ☆19Updated 2 years ago
- ☆23Updated 2 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- A project to run fuzzing jobs at scale with Kubernetes.☆147Updated 4 years ago
- DEPRECATED — Containerized Cloud Fuzzing☆27Updated 6 years ago
- Underconstrained symbolic execution for cryptography verification☆18Updated 4 years ago
- AVX-2 vectorised 8-bit positional popcount for Go☆23Updated 4 years ago
- A library for disassembling x86-64 binaries.☆41Updated last week
- ☆15Updated 8 years ago
- Golang implementation of datalog, port of MITRE corporation's lua implementation☆24Updated 4 years ago
- Fuzzing Go crypto☆74Updated 6 years ago
- A small tool for quickly generating LLVM passes☆28Updated this week
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 6 months ago
- A socket to rule all other sockets.☆9Updated 9 years ago
- Convert Linux perf traces to Go pprof format☆21Updated 8 years ago
- ☆20Updated 2 years ago
- Detect compiler names and versions from ELF files☆25Updated 7 months ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 7 years ago
- CI/CD pipeline for building and publishing multiple 🐳 containers as microservices within a mono repository.☆47Updated this week
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- Detect which compiler and compiler version a Linux executable (in the ELF format) was compiled with☆30Updated last year
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- Deterministic key generation for Go.☆18Updated 9 months ago