ph4r05 / py-tpm-utils
Simple TPM utils in Python for generating random numbers & RSA keys
☆19Updated 8 years ago
Alternatives and similar repositories for py-tpm-utils:
Users that are interested in py-tpm-utils are comparing it to the libraries listed below
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 2 months ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 6 years ago
- SAVIORBURST☆21Updated 9 years ago
- ☆20Updated 3 years ago
- all things awesome security☆12Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- USB armory - boot loader☆33Updated last month
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- A Facedancer21 expansion board for the BeagleBone.☆23Updated 11 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Curated list of open-source TPM (Trusted Platform Module) applications☆24Updated 3 years ago
- Format string exploit generation☆10Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Phishing Toolkit☆20Updated 7 years ago
- ☆13Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago