Tools for timing attacks
☆19Oct 19, 2015Updated 10 years ago
Alternatives and similar repositories for mona-timing-lib
Users that are interested in mona-timing-lib are comparing it to the libraries listed below
Sorting:
- This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.☆25Mar 17, 2023Updated 2 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- ☆11Aug 9, 2016Updated 9 years ago
- A tool for performing network timing attacks on plaintext and hashed password authentication.☆21May 30, 2013Updated 12 years ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated 11 months ago
- QL Workshop☆16Sep 30, 2019Updated 6 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆84Aug 6, 2014Updated 11 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- hardware security course from Coursera and University of Maryland☆28Mar 12, 2015Updated 10 years ago
- GitHub Action to analyze Pull Requests for open-source supply chain issues☆16Nov 4, 2025Updated 3 months ago
- Repository for the wireshark plugin development project of the AMOS 16 course☆10Jan 6, 2017Updated 9 years ago
- ☆13Aug 5, 2025Updated 6 months ago
- LTE monitor mode for Samsung C2xx-based USB dongles. Includes wireshark dissector and Linux kernel driver.☆46Nov 21, 2014Updated 11 years ago
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- Mainframe bruter and screen automation utility.☆43Sep 28, 2014Updated 11 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- X.509 certificate linter☆159Feb 13, 2020Updated 6 years ago
- Android app for the RF430FRL152H and other NFC Type V tags.☆49Jun 25, 2020Updated 5 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- ☆12Oct 1, 2024Updated last year
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Oct 26, 2014Updated 11 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Curso optativo de Deep Learning para UNICEN☆11Aug 25, 2021Updated 4 years ago
- Generic ASN.1 decoder/encoder to a structured text syntax☆50Sep 7, 2021Updated 4 years ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Nov 30, 2018Updated 7 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- ☆10Jun 13, 2014Updated 11 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Smart contracts for a home rental network with IoT doorlocks☆11Jun 5, 2018Updated 7 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- Dockerized TOR socks5☆10Jul 15, 2018Updated 7 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago