ph4r05 / py-tpm-utils
Simple TPM utils in Python for generating random numbers & RSA keys
☆17Updated 7 years ago
Related projects: ⓘ
- A USB armory based USB sandbox☆20Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 7 months ago
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆34Updated 9 years ago
- ☆13Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Framework for building transparent memory encryption and authentication solutions☆25Updated 6 years ago
- ☆20Updated 2 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆47Updated 2 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- Web of trust grapher☆38Updated 6 months ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- A research tool to identify the version of shared library files.☆21Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆25Updated 6 years ago
- ☆16Updated this week
- Firmware analysis gone wild.☆42Updated 10 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆37Updated 4 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 8 years ago
- FPGA glitcher based on toothlessco's arty-glitcher, but for the icebreaker☆16Updated 4 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- A framework for parsing binary data.☆16Updated 2 years ago
- descrypt-ztex-bruteforcer☆16Updated 10 years ago
- Phishing Toolkit☆19Updated 6 years ago
- stuff from my ToorCon 2015 talk☆15Updated 8 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 7 years ago
- advanced code generator for John the Ripper☆12Updated 6 years ago
- ☆34Updated last year