ph4r05 / py-tpm-utilsLinks
Simple TPM utils in Python for generating random numbers & RSA keys
☆20Updated 8 years ago
Alternatives and similar repositories for py-tpm-utils
Users that are interested in py-tpm-utils are comparing it to the libraries listed below
Sorting:
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Cryptographic Dataset Generation & Modelling Framework☆40Updated 5 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Conferences, tools, papers, etc.☆45Updated 3 weeks ago
- ☆16Updated 5 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Decoders for 7ev3n ransomware☆17Updated 9 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆27Updated 6 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Updated 8 years ago
- ☆16Updated 9 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 7 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Copy of the contents at phrack.com☆41Updated 8 months ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago