vmonaco / kreepLinks
Keystroke Recognition and Entropy Elimination Program
☆14Updated 6 years ago
Alternatives and similar repositories for kreep
Users that are interested in kreep are comparing it to the libraries listed below
Sorting:
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 8 years ago
- SGX command-line tools and paper☆147Updated 9 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Repo of code for FPStalker article☆32Updated 8 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- ☆145Updated 8 months ago
- TLS Fingerprints☆51Updated 8 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆70Updated 3 years ago
- ☆197Updated last year
- ☆77Updated 7 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Updated 10 years ago
- Personal writeups of interesting challenges from attended CTFs☆12Updated 6 years ago
- Spectre attack against SGX enclave☆238Updated 7 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Updated 2 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Solutions for the Matasano Crypto Challenges☆24Updated 7 years ago
- Solutions to Matasano crypto challenges in Python 3.☆108Updated 2 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆177Updated 5 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆109Updated 3 years ago
- ☆152Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- ☆27Updated 3 years ago
- A cryptographic method that defends against side-channel attacks☆25Updated 9 years ago
- ☆170Updated 4 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- OpenSGX☆305Updated 5 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Detect common mistakes in academic papers☆61Updated 6 years ago