soatok / gcm-exploitLinks
☆17Updated last year
Alternatives and similar repositories for gcm-exploit
Users that are interested in gcm-exploit are comparing it to the libraries listed below
Sorting:
- A PoC for batch attacks against ECC keypairs generated from short seeds.☆14Updated 10 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆52Updated this week
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆70Updated 6 months ago
- A cache hard password hash/KDF☆48Updated last year
- ☆20Updated last year
- A tiny, portable implementation of the IPCrypt specification in C.☆31Updated 2 months ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆55Updated this week
- Minimal setup to trigger the xz backdoor☆29Updated last year
- A fast, easy-to-use, and secure command-line tool for encrypting and decrypting files or entire directory trees.☆54Updated 3 weeks ago
- data-at-rest updatable threshold encryption KMS server and client☆21Updated last month
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆59Updated last year
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 8 months ago
- post-quantum safe encryption plugin for age encryption☆24Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last month
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 6 months ago
- ☆70Updated 2 years ago
- Compress sets of integers efficiently☆23Updated 7 months ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- Privacy Pass implementation in Rust☆53Updated last week
- ☆27Updated 2 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Updated 3 years ago
- Compiling C to FlipJump☆95Updated 10 months ago
- F-Droid Fake Signer PoC☆124Updated 10 months ago
- Filesystems that cause an OS panic☆13Updated 5 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- ☆14Updated 2 years ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated this week
- ☆17Updated 2 years ago
- Got a bogus CVE someone got for a non-vuln? Please share here!☆25Updated last year