samvartaka / crypto_backdoorsView external linksLinks
Various cryptographic backdoors and tools to detect them
☆21Sep 5, 2015Updated 10 years ago
Alternatives and similar repositories for crypto_backdoors
Users that are interested in crypto_backdoors are comparing it to the libraries listed below
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 9 months ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- PGPv4 long key-id collision test-cases; MitM keyserver PoC; script to safely import keys from keyservers☆35Feb 13, 2020Updated 6 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Berliner Spargel OS☆12May 26, 2014Updated 11 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Chacha20Poly1305 AEAD☆17Mar 15, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Reimplementation of libdetectcoll in Go☆19Mar 6, 2017Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- ☆16Apr 20, 2024Updated last year
- ☆19Jun 7, 2021Updated 4 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆25Aug 5, 2016Updated 9 years ago
- Run a desktop enviornment in GitHub codespaces☆10Jan 7, 2025Updated last year
- A research platform and active library for generalised SAT solving☆33Jun 12, 2025Updated 8 months ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Trust Zone Project☆21Jan 6, 2015Updated 11 years ago
- DEPRICATED☆32May 21, 2018Updated 7 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- GitHub codespacesで体験するFIWARE学習コンテンツ☆10Sep 25, 2024Updated last year
- Bitcoin Hush☆12Apr 29, 2020Updated 5 years ago
- ☆10Nov 3, 2024Updated last year
- Some scripts for attacks on Tacacs+ protocol☆66Aug 27, 2019Updated 6 years ago
- Scripts to parse and analyze pgp key server data☆33Jul 16, 2020Updated 5 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- SAT instance generator for SHA-1☆49Feb 12, 2021Updated 5 years ago