Various cryptographic backdoors and tools to detect them
☆21Sep 5, 2015Updated 10 years ago
Alternatives and similar repositories for crypto_backdoors
Users that are interested in crypto_backdoors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PGPv4 long key-id collision test-cases; MitM keyserver PoC; script to safely import keys from keyservers☆35Feb 13, 2020Updated 6 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Example queries for joern☆18Feb 2, 2017Updated 9 years ago
- Berliner Spargel OS☆12May 26, 2014Updated 11 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Reimplementation of libdetectcoll in Go☆19Mar 6, 2017Updated 9 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 11 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Chacha20Poly1305 AEAD☆17Mar 15, 2015Updated 11 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Apr 17, 2020Updated 6 years ago
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 11 years ago
- Timing Attack on TLS' ECDSA signature☆46Sep 8, 2015Updated 10 years ago
- ☆13Apr 29, 2016Updated 10 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server☆12Jun 19, 2015Updated 10 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Aug 5, 2016Updated 9 years ago
- Trust Zone Project☆21Jan 6, 2015Updated 11 years ago
- ☆12Apr 11, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scripts to parse and analyze pgp key server data☆33Jul 16, 2020Updated 5 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Taiga.Io as a Docker Image. Ready to docker-compose up.☆13Sep 29, 2019Updated 6 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Oct 11, 2017Updated 8 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Jun 13, 2023Updated 2 years ago
- Satellite: Measuring The Internet's Stars☆39Sep 2, 2020Updated 5 years ago
- ☆159Feb 23, 2015Updated 11 years ago
- Project for a Computer Security class based on CSAW capture the flag challenges☆13Mar 19, 2014Updated 12 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆18Nov 19, 2020Updated 5 years ago
- Picon☆39Apr 16, 2017Updated 9 years ago
- A small configurable server for stubbing external systems during development.☆17Mar 15, 2016Updated 10 years ago
- A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.☆92Apr 18, 2017Updated 9 years ago
- Android App that genereates passcode authentication codes for Postfinance cards☆12Feb 22, 2022Updated 4 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Start of an Internet draft on the separation between HTTP's semantic layer, framing layer(s), and the underlying transport layer.☆15Mar 22, 2016Updated 10 years ago