robertdavidgraham / ecb-penguinLinks
Demonstrating the famous ECB penguin so that you can repeat the process yourself.
☆59Updated 3 years ago
Alternatives and similar repositories for ecb-penguin
Users that are interested in ecb-penguin are comparing it to the libraries listed below
Sorting:
- Minimal setup to trigger the xz backdoor☆29Updated last year
- crypto-condor is a Python library for compliance testing of implementations of cryptographic primitives☆33Updated 2 months ago
- A Course in Cryptanalysis☆149Updated last year
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆86Updated 8 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- Binary Golf Grand Prix☆115Updated 2 years ago
- ☆27Updated 2 years ago
- TPM-Fail Attack code & data☆123Updated 2 years ago
- ☆41Updated last year
- data-at-rest updatable threshold encryption KMS server and client☆22Updated 2 months ago
- Infer internal state of Mersenne Twister from truncated output☆77Updated 3 years ago
- A tool to help you understand TPM commands and responses.☆47Updated last year
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- OWASP Foundation Web Respository☆11Updated 2 weeks ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆323Updated 5 years ago
- JCrypTool Core Plug-ins☆172Updated 2 years ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆73Updated last year
- Discusses how to verify DKIM signatures in old emails, namely one of the Hunter Biden emails in the news☆102Updated 3 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆62Updated 3 years ago
- ☆24Updated 3 years ago
- Collected and authored guides for personal and operational security.☆66Updated 3 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆82Updated last month
- Upstream for Non Interactive Zero Knowledge CTF platform☆10Updated 5 years ago
- Modify a message to have a desired CRC signature.☆126Updated 4 years ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆270Updated last year
- Generic ASN.1 decoder/encoder to a structured text syntax☆49Updated 4 years ago
- ☆24Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 5 years ago