ph4r05 / py-tpm-utilsLinks
Simple TPM utils in Python for generating random numbers & RSA keys
☆19Updated 8 years ago
Alternatives and similar repositories for py-tpm-utils
Users that are interested in py-tpm-utils are comparing it to the libraries listed below
Sorting:
- Hardware Accelerated Cold-Boot Attacks☆12Updated 8 years ago
- Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses☆13Updated 2 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- PANORAMIX repo☆20Updated 2 years ago
- Curated list of open-source TPM (Trusted Platform Module) applications☆24Updated 3 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 5 months ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated last year
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Save scan results to a database☆12Updated last week
- X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting☆42Updated 2 years ago
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- An RF stack for building exfiltration systems.☆16Updated 6 years ago
- USB armory - boot loader☆37Updated 4 months ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 3 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated last month
- A tool to help you understand TPM commands and responses.☆45Updated 7 months ago
- ☆13Updated 7 years ago
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆22Updated 4 months ago
- betrusted.io main SoC design☆12Updated 5 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- Geolocate your files!☆16Updated 3 years ago