TPM-Fail Attack code & data
☆124May 7, 2023Updated 2 years ago
Alternatives and similar repositories for TPM-FAIL
Users that are interested in TPM-FAIL are comparing it to the libraries listed below
Sorting:
- ☆42Jun 27, 2022Updated 3 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Dec 7, 2022Updated 3 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- ☆19Jul 13, 2020Updated 5 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Sep 21, 2022Updated 3 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- Timing Attack on TLS' ECDSA signature☆47Sep 8, 2015Updated 10 years ago
- A lookup table for the discrete log in secp265k1☆23Feb 27, 2021Updated 5 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Open source solver to the batch auction problem.☆13Feb 16, 2021Updated 5 years ago
- old website files☆10Jun 30, 2016Updated 9 years ago
- ☆12Jun 25, 2021Updated 4 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- Python implementation of the index calculus method for solving discrete logarithm problems☆26Mar 17, 2020Updated 5 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- MLKEM implementation optimized for embedded microcontrollers☆27Dec 1, 2025Updated 3 months ago
- Constant-Time WebAssembly☆24Oct 16, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- The code to the SGX-ROP paper☆185Apr 4, 2020Updated 5 years ago
- JTAG Tools For FTDI MPSSE Transports☆13Jul 22, 2014Updated 11 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- Intel Management Engine JTAG Proof of Concept☆540Jun 12, 2020Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆115Oct 8, 2018Updated 7 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- PeayBASIC is a BASIC interpreter written in C# that allows simultaneous text and graphical output. It was made for my undergrad senior pr…☆13Aug 25, 2013Updated 12 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- A very simple coverage highlighter for VIM☆12Dec 2, 2020Updated 5 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- ☆17Jun 7, 2022Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- ☆16Updated this week