romangol / cryptoMisuseLinks
Misuse cases of Cryptography in real world software products
☆12Updated 6 years ago
Alternatives and similar repositories for cryptoMisuse
Users that are interested in cryptoMisuse are comparing it to the libraries listed below
Sorting:
- Integrate the dharma grammar fuzzer into honggfuzz☆26Updated 7 years ago
- White-box analytic framework based on LLVM☆39Updated 5 years ago
- poststructural fuzzing☆31Updated 5 years ago
- Fuzzing JavaScript WebAssembly APIs using Dharma/Domato (Chrome/v8, etc.)☆43Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 4 years ago
- RealWorld CTF 5th realwrap challenge☆18Updated 2 years ago
- How to Exploit Blockchain Public Chain and Smart Contract Vulnerability☆8Updated 6 years ago
- This repository give exmaple of attacks on SEAL, to show the danger of using homomorphic encryption☆4Updated 6 years ago
- jsfunfuzz patched to fuzz v8☆12Updated 5 years ago
- ☆17Updated 3 months ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆36Updated 2 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- BigMap integration on AFL++☆15Updated 4 years ago
- An educational toy fuzzer with big dreams☆12Updated last year
- Corpora used to seed NSS' fuzzing targets☆10Updated this week
- RealWorld CTF 3rd billboard challenge & writeup☆27Updated 2 years ago
- TRACER Symbolic Execution Tool☆28Updated 4 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- Cryptanalysis of the Legendre PRF Challenges☆11Updated 5 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Fuzzer for Wasm and Wasmer☆28Updated 5 years ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Repo for fuzzing projects☆46Updated 4 years ago
- Writeups of CTF challenges☆31Updated 4 years ago
- single file ctf/exploit client library - python3, type annotated☆70Updated 2 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆10Updated 4 years ago
- ☆23Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Reversing Ewasm (Ethereum WebAssembly) contract 101 - Workshop☆18Updated 4 years ago