romangol / cryptoMisuse
Misuse cases of Cryptography in real world software products
☆11Updated 5 years ago
Related projects: ⓘ
- ☆14Updated 5 years ago
- RealWorld CTF 5th realwrap challenge☆18Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- ☆16Updated 6 months ago
- Cryptanalysis of the Legendre PRF Challenges☆11Updated 4 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Updated 7 years ago
- poststructural fuzzing☆31Updated 4 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 6 months ago
- This repository give exmaple of attacks on SEAL, to show the danger of using homomorphic encryption☆3Updated 5 years ago
- White-box analytic framework based on LLVM☆39Updated 5 years ago
- RealWorld CTF 3rd billboard challenge & writeup☆26Updated last year
- ☆17Updated last year
- Fuzzing JavaScript WebAssembly APIs using Dharma/Domato (Chrome/v8, etc.)☆42Updated 2 years ago
- Notes on cryptographic schemes and attacks☆25Updated 5 years ago
- ☆35Updated 4 years ago
- Complete examples of solidity exploits☆13Updated 6 years ago
- single file ctf/exploit client library - python3, type annotated☆66Updated last year
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 5 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆11Updated last year
- Writeups of CTF challenges☆32Updated 3 years ago
- jsfunfuzz patched to fuzz v8☆12Updated 4 years ago
- Reversing Ewasm (Ethereum WebAssembly) contract 101 - Workshop☆18Updated 3 years ago
- How to Exploit Blockchain Public Chain and Smart Contract Vulnerability☆8Updated 5 years ago
- shw's CTF challenges☆27Updated 3 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆12Updated last year
- Example Manticore scripts☆68Updated 9 months ago
- Static analysis framework for EVM bytecode☆28Updated 4 years ago
- Differential fuzzing for elliptic curves☆22Updated last year
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year