Various cryptographic backdoors and tools to detect them
☆21Sep 5, 2015Updated 10 years ago
Alternatives and similar repositories for crypto_backdoors
Users that are interested in crypto_backdoors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- PGPv4 long key-id collision test-cases; MitM keyserver PoC; script to safely import keys from keyservers☆35Feb 13, 2020Updated 6 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Berliner Spargel OS☆12May 26, 2014Updated 11 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Reimplementation of libdetectcoll in Go☆19Mar 6, 2017Updated 9 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Apr 17, 2020Updated 5 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 11 months ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- ☆13Apr 29, 2016Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆46Sep 8, 2015Updated 10 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Aug 5, 2016Updated 9 years ago
- Trust Zone Project☆21Jan 6, 2015Updated 11 years ago
- Install Ubuntu on Android Without Root.☆49Updated this week
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Scripts to parse and analyze pgp key server data☆33Jul 16, 2020Updated 5 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Oct 11, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Satellite: Measuring The Internet's Stars☆39Sep 2, 2020Updated 5 years ago
- Landing page for MAEC docs☆23Oct 22, 2022Updated 3 years ago
- ☆12Sep 8, 2019Updated 6 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- Project for a Computer Security class based on CSAW capture the flag challenges☆13Mar 19, 2014Updated 12 years ago
- Snorlax is a sorting algorithm with extremely high efficiency O(1). The implementation in this repository is written in Java.☆11Jan 12, 2016Updated 10 years ago
- ☆18Nov 19, 2020Updated 5 years ago