ph4r05 / py-tpm-utilsLinks
Simple TPM utils in Python for generating random numbers & RSA keys
☆20Updated 8 years ago
Alternatives and similar repositories for py-tpm-utils
Users that are interested in py-tpm-utils are comparing it to the libraries listed below
Sorting:
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆79Updated 6 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Framework☆39Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- ☆50Updated last week
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 7 months ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 6 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Conferences, tools, papers, etc.☆44Updated last month
- Format string exploit generation☆10Updated 10 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- Phishing Toolkit☆20Updated 7 years ago
- ☆32Updated 6 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Updated 7 years ago
- Repo for the paper "USB Devices phoning home"☆22Updated 9 years ago
- ☆30Updated 5 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- ☆25Updated 2 months ago