New TLS Padding Oracles
☆125May 14, 2023Updated 2 years ago
Alternatives and similar repositories for TLS-Padding-Oracles
Users that are interested in TLS-Padding-Oracles are comparing it to the libraries listed below
Sorting:
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated 2 weeks ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- X41 Smartcard Fuzzer☆120Jan 15, 2019Updated 7 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆13Feb 11, 2018Updated 8 years ago
- A collection of SSL/TLS security related resources.☆56Jan 13, 2025Updated last year
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Nov 30, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Some Rust code for submitting a cert to all of Chrome's trusted CT logs and getting back the SCTs☆16Jun 19, 2022Updated 3 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆263Oct 6, 2023Updated 2 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- Our publications of the Swiss E-Voting Public Intrusion Test (PIT)☆47Mar 12, 2019Updated 6 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- HTML-embeddable x86_64 emulator☆83Feb 20, 2025Updated last year
- ☆20Dec 13, 2019Updated 6 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Simple Server Side Request Forgery services enumeration tool.☆56Aug 23, 2018Updated 7 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆406Oct 30, 2023Updated 2 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Jan 27, 2022Updated 4 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- TLS Redirection☆118Nov 21, 2017Updated 8 years ago
- ☆80Jul 30, 2020Updated 5 years ago
- ☆41Apr 26, 2018Updated 7 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Jan 17, 2022Updated 4 years ago
- LKRG bypass methods☆74Jan 10, 2020Updated 6 years ago
- ☆44Oct 22, 2025Updated 4 months ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- The history of Windows Internals via symbols.☆181Nov 4, 2021Updated 4 years ago