wolf43 / AES-GCM-exampleLinks
An example of AES GCM encryption mode using Pycryptodome
☆26Updated 5 years ago
Alternatives and similar repositories for AES-GCM-example
Users that are interested in AES-GCM-example are comparing it to the libraries listed below
Sorting:
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 3 years ago
- ☆20Updated 11 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆69Updated 8 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Embedded AppSec Best Practices☆44Updated 3 months ago
- Sensor software☆68Updated 4 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Updated 11 years ago
- Copy of the contents at phrack.com☆41Updated 10 months ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- ☆52Updated last week
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆18Updated 3 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆121Updated 3 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 6 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 4 months ago
- ☆94Updated 5 years ago
- Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper☆17Updated 3 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 3 years ago
- Cryptanalysis library for breaking classical ciphers☆27Updated 6 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago