samvartaka / crypto_backdoors
Various cryptographic backdoors and tools to detect them
☆21Updated 9 years ago
Alternatives and similar repositories for crypto_backdoors:
Users that are interested in crypto_backdoors are comparing it to the libraries listed below
- ☆24Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- an open source toolkit for PCI bus exploration☆70Updated 8 years ago
- Statically linked Library detector☆70Updated 10 years ago
- A Genetic File, Syscall and Network Fuzzer.☆59Updated 7 years ago
- free crypto audit☆31Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆10Updated 9 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 9 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- Detect some forms of linux kernel tampering☆12Updated 9 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- ☆17Updated 10 years ago
- ☆17Updated 7 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago