soatok / gcm-exploitLinks
☆16Updated last year
Alternatives and similar repositories for gcm-exploit
Users that are interested in gcm-exploit are comparing it to the libraries listed below
Sorting:
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆68Updated 5 months ago
- data-at-rest updatable threshold encryption KMS server and client☆21Updated last week
- ☆20Updated last year
- A PoC for batch attacks against ECC keypairs generated from short seeds.☆13Updated 9 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last week
- ☆109Updated 3 weeks ago
- A tiny, portable implementation of the IPCrypt specification in C.☆30Updated last month
- ☆14Updated 2 years ago
- Minimal setup to trigger the xz backdoor☆28Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Got a bogus CVE someone got for a non-vuln? Please share here!☆25Updated last year
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated last week
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 5 months ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 10 months ago
- tvisor is a tiny 100% userspace syscall interception framework☆44Updated last year
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated this week
- A portable assembler for Z80, 8080, Gameboy, 6805, 8051 and others.☆41Updated 2 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- ☆26Updated last year
- A demonstrative cryptographically secure RISC-V bootloader written in Rust for a final year project at The University of Manchester☆66Updated last year
- ☆17Updated 2 years ago
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆63Updated this week
- A cache hard password hash/KDF☆48Updated last year
- F-Droid Fake Signer PoC☆126Updated 9 months ago
- A super simple /sbin/init for Linux which allows running one and only one program☆28Updated last year
- arm decoders for the yaxpeax project☆31Updated 3 weeks ago
- Specification for a Fediverse Directory Server for Public Keys☆128Updated 2 weeks ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated 2 weeks ago
- ☆21Updated 7 months ago