wolf43 / AES-GCM-example
An example of AES GCM encryption mode using Pycryptodome
☆25Updated 4 years ago
Alternatives and similar repositories for AES-GCM-example:
Users that are interested in AES-GCM-example are comparing it to the libraries listed below
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆16Updated 5 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- Copy of the contents at phrack.com☆38Updated last month
- ☆19Updated 11 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Spark MLib Training Models for Network Security☆16Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- A script to automate Jenkins credential store decryption☆17Updated 6 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Embedded AppSec Best Practices☆40Updated last year
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Learning about disassembling☆20Updated 5 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- A few ZigBee Tools to compliment KillerBee☆53Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- A simple Shellshock scanner in python☆41Updated 10 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Viproxy (Interactive TCP/TLS proxy forked from em-proxy)☆11Updated 10 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- ☆15Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Suite for Information gathering☆12Updated 6 years ago