Various cryptographic backdoors and tools to detect them
☆21Sep 5, 2015Updated 10 years ago
Alternatives and similar repositories for crypto_backdoors
Users that are interested in crypto_backdoors are comparing it to the libraries listed below
Sorting:
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 10 months ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- PGPv4 long key-id collision test-cases; MitM keyserver PoC; script to safely import keys from keyservers☆35Feb 13, 2020Updated 6 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Berliner Spargel OS☆12May 26, 2014Updated 11 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Chacha20Poly1305 AEAD☆17Mar 15, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Open source library to handle integers of any size in C☆14Apr 11, 2023Updated 2 years ago
- Reimplementation of libdetectcoll in Go☆19Mar 6, 2017Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆47Sep 8, 2015Updated 10 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- ☆19Jun 7, 2021Updated 4 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆25Aug 5, 2016Updated 9 years ago
- A research platform and active library for generalised SAT solving☆33Jun 12, 2025Updated 8 months ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Trust Zone Project☆21Jan 6, 2015Updated 11 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Bitcoin Hush☆12Apr 29, 2020Updated 5 years ago
- ☆18Jun 10, 2025Updated 8 months ago
- Some scripts for attacks on Tacacs+ protocol☆66Aug 27, 2019Updated 6 years ago
- Scripts to parse and analyze pgp key server data☆33Jul 16, 2020Updated 5 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Libary for using OScam dvbapi within various applications. This Plugin is not for usage, only experiment and research.☆11Jan 4, 2024Updated 2 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- Some small network-related utilities☆34Sep 30, 2016Updated 9 years ago
- SAT instance generator for SHA-1☆49Feb 12, 2021Updated 5 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆39Sep 2, 2020Updated 5 years ago
- OnionTip is a web app which parses Tor relay data to allow users to tip volunteers for running relay in a fair and open way.☆53Mar 14, 2018Updated 7 years ago