TPM-Fail Attack code & data
☆122May 7, 2023Updated 2 years ago
Alternatives and similar repositories for TPM-FAIL
Users that are interested in TPM-FAIL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Dec 7, 2022Updated 3 years ago
- ☆41Jun 27, 2022Updated 3 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- JTAG Tools For FTDI MPSSE Transports☆13Jul 22, 2014Updated 11 years ago
- Working Set Page Cache side-channel IPC PoC☆67Jan 9, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- A lookup table for the discrete log in secp265k1☆23Feb 27, 2021Updated 5 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- ☆12Jun 25, 2021Updated 4 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 4 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- Tool for UEFI Secure Boot DBX updates☆27Aug 23, 2022Updated 3 years ago
- Python implementation of the index calculus method for solving discrete logarithm problems☆26Mar 17, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆27Oct 7, 2021Updated 4 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- Constant-Time WebAssembly☆25Oct 16, 2018Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- ☆25Jun 2, 2024Updated last year
- Side-channel file transfer between independent VMs or processes executed on the same physical host.☆51Jun 1, 2021Updated 4 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- ☆24Feb 23, 2024Updated 2 years ago
- A Python based ECDSA secp256k1 private key recovery tool☆33Mar 18, 2024Updated 2 years ago
- The code to the SGX-ROP paper☆183Apr 4, 2020Updated 6 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- kCFI Documentation☆15Apr 18, 2017Updated 9 years ago
- LLVM Compiler Infrastructure with TriCore backend☆32Jul 6, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆11Dec 6, 2017Updated 8 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Microarchitectural exploitation and other hardware attacks.☆97Mar 25, 2024Updated 2 years ago
- ☆34May 20, 2021Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆540Jun 12, 2020Updated 5 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- MLKEM implementation optimized for embedded microcontrollers☆28Dec 1, 2025Updated 4 months ago