samvartaka / crypto_backdoors
Various cryptographic backdoors and tools to detect them
☆21Updated 9 years ago
Alternatives and similar repositories for crypto_backdoors:
Users that are interested in crypto_backdoors are comparing it to the libraries listed below
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- ☆24Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- an open source toolkit for PCI bus exploration☆70Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- ☆36Updated 12 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 9 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- lte security☆41Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆50Updated 9 years ago
- Memory awesomeness.☆29Updated 10 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago