wolf43 / AES-GCM-exampleLinks
An example of AES GCM encryption mode using Pycryptodome
☆25Updated 4 years ago
Alternatives and similar repositories for AES-GCM-example
Users that are interested in AES-GCM-example are comparing it to the libraries listed below
Sorting:
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 4 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 5 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 7 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Copy of the contents at phrack.com☆38Updated 2 months ago
- Jaqen - Simple DNS rebinding☆73Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Universal Plug and Fuzz☆42Updated 5 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆41Updated 5 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- A few ZigBee Tools to compliment KillerBee☆53Updated 8 years ago
- MS-CHAP-V2 SHOULD NOT be used...☆18Updated 3 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Updated 8 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- USB armory - hardware control tool☆32Updated 3 months ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- ☆13Updated 7 years ago
- ☆15Updated 8 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 7 years ago
- Firmware analysis website + API☆43Updated 4 years ago
- ☆13Updated 7 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago