ph4r05 / py-tpm-utils
Simple TPM utils in Python for generating random numbers & RSA keys
☆19Updated 8 years ago
Alternatives and similar repositories for py-tpm-utils
Users that are interested in py-tpm-utils are comparing it to the libraries listed below
Sorting:
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- Heap analysis tooling for mempool☆13Updated 2 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Linux crash harness with runtime process instrumentation☆22Updated 4 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- lte security☆41Updated 9 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- ☆34Updated 2 years ago
- Some stuff about telecom security☆14Updated 9 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- SAVIORBURST☆21Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- ☆20Updated 3 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Android application which allows sending SMS, with a specific SMSC without changing system defaults.☆13Updated 10 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- ☆13Updated 7 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 9 years ago