ph4r05 / py-tpm-utilsLinks
Simple TPM utils in Python for generating random numbers & RSA keys
☆19Updated 8 years ago
Alternatives and similar repositories for py-tpm-utils
Users that are interested in py-tpm-utils are comparing it to the libraries listed below
Sorting:
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Conferences, tools, papers, etc.☆43Updated 2 months ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- ☆15Updated 8 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 10 months ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Phishing Toolkit☆20Updated 7 years ago
- ☆32Updated 5 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 7 years ago
- ☆13Updated 5 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- Web of trust grapher☆38Updated last month
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆80Updated 5 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago