Encryption / Decryption of images with AES-CBC/ECB
☆20Jan 3, 2021Updated 5 years ago
Alternatives and similar repositories for image-encryption
Users that are interested in image-encryption are comparing it to the libraries listed below
Sorting:
- File Encryption/Decryption and Implementation of Digital Signature using Elliptical Curve Cryptography technique.☆34Jun 12, 2015Updated 10 years ago
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆15Dec 13, 2023Updated 2 years ago
- OP-TEE integration for the MS TPM 2.0 Reference Implementation (fTPM)☆18Jan 16, 2026Updated last month
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 4 years ago
- 更新支持swift☆18Dec 30, 2020Updated 5 years ago
- A simple library to log all objc_msgSend calls☆19May 22, 2020Updated 5 years ago
- ☆25Sep 29, 2025Updated 5 months ago
- Documentation for project Celadon☆27Mar 31, 2025Updated 11 months ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Mar 7, 2024Updated last year
- The Intel(R) Enhanced Privacy ID Software Development Kit☆30Jan 3, 2023Updated 3 years ago
- Trigger the rowhammer bug on ARMv8☆35Apr 14, 2019Updated 6 years ago
- TCTI module for use with TSS2 libraries in UEFI environment☆39Nov 14, 2024Updated last year
- Archive of old branches for EDK II☆35Sep 12, 2018Updated 7 years ago
- ☆32Jul 11, 2022Updated 3 years ago
- The CloudProxy Tao for Trustworthy Computing☆37Aug 30, 2017Updated 8 years ago
- My bug bounty notes☆35Apr 10, 2021Updated 4 years ago
- Fingerprinting Mobile Devices Using Personalized Configurations☆41May 23, 2023Updated 2 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Apr 13, 2022Updated 3 years ago
- ⛔️ DEPRECATED☆38Mar 22, 2021Updated 4 years ago
- ☆39Sep 9, 2025Updated 5 months ago
- Enarx.dev website and relevant assets☆43May 3, 2022Updated 3 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42May 9, 2020Updated 5 years ago
- Linux kernel source tree☆44Jan 21, 2026Updated last month
- ☆45Sep 7, 2025Updated 5 months ago
- This repo is used for managing conversations about Veraison features☆53Jan 16, 2024Updated 2 years ago
- An Open Enclave port of the ONNX inference server with data encryption and attestation capabilities to enable confidential inference on A…☆59Aug 30, 2022Updated 3 years ago
- Fortinet FortiClient EMS SQL Injection☆52Mar 20, 2024Updated last year
- This repository contains the nested kernel implementation as it was built for the ASPLOS 2015 paper, including the FreeBSD prototype Pers…☆55Jul 7, 2017Updated 8 years ago
- K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388☆54May 9, 2022Updated 3 years ago
- Carve file metadata from NTFS index ($I30) attributes☆71Feb 3, 2024Updated 2 years ago
- Flow analysis using Soot☆52Jun 12, 2020Updated 5 years ago
- Resources and writeups for studying & practicing iOS security☆64Oct 16, 2021Updated 4 years ago
- 使用Soot进行android应用静态分析☆68Jul 8, 2018Updated 7 years ago
- Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.☆74Feb 25, 2022Updated 4 years ago
- There are some papers about fuzzing. I record them by Xmind. Welcome to contact to me.☆276Oct 28, 2019Updated 6 years ago
- Android GuardION patches to mitigate DMA-based Rowhammer attacks on ARM☆76Apr 23, 2018Updated 7 years ago
- This is the main repo for Penglai.☆74Oct 12, 2023Updated 2 years ago
- ☆87Sep 5, 2021Updated 4 years ago