Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI
☆13Mar 20, 2019Updated 6 years ago
Alternatives and similar repositories for Hulk
Users that are interested in Hulk are comparing it to the libraries listed below
Sorting:
- drivesploit-testing☆26Jul 28, 2010Updated 15 years ago
- A braindead program for cracking encrypted RAR archives. Originally inspired by http://rarcrack.sourceforge.net/ but that's just too slow…☆16Jun 20, 2013Updated 12 years ago
- ☆15Sep 7, 2020Updated 5 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Nov 27, 2018Updated 7 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆91Jan 17, 2019Updated 7 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- Raiden project☆24Nov 7, 2021Updated 4 years ago
- White-box Analysis and Implementation Tools☆77Jan 27, 2022Updated 4 years ago
- tiny x86 cpu emulator☆27Mar 18, 2018Updated 7 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- unicorn emulator for x64dbg☆34Feb 21, 2018Updated 8 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Jul 26, 2024Updated last year
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆46Nov 28, 2022Updated 3 years ago
- Android app for the RF430FRL152H and other NFC Type V tags.☆49Jun 25, 2020Updated 5 years ago
- SmaliAnalyzer parses dissasembled bytecode of Android applications to gather as much information as possible about their component classe…☆13Apr 17, 2019Updated 6 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- black Ip lists, dorks-collection☆16Updated this week
- Widevine Key Ladder in Python3☆48Feb 2, 2022Updated 4 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Enable bluetooth discoverability is android studio☆10Nov 5, 2016Updated 9 years ago
- the centralized smart contract platform☆14Jan 5, 2025Updated last year
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Nov 25, 2019Updated 6 years ago
- 组件比antd少了几个, 但是功能也很多哦, 原生JS编写☆11Mar 10, 2025Updated 11 months ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Repository for the Oulu University Security Engineering course.☆14Sep 12, 2025Updated 5 months ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- VGP (Very Good Privacy) E2E Encryption Library☆11Jan 29, 2021Updated 5 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".☆13Nov 5, 2020Updated 5 years ago
- The course cryptographic systems and their weaknesses in the University of Oulu☆10Jan 8, 2026Updated last month
- A tool to investigate the Windows device manager☆13Feb 12, 2019Updated 7 years ago