wolf43 / AES-GCM-exampleLinks
An example of AES GCM encryption mode using Pycryptodome
☆26Updated 5 years ago
Alternatives and similar repositories for AES-GCM-example
Users that are interested in AES-GCM-example are comparing it to the libraries listed below
Sorting:
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Updated 10 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆68Updated 8 years ago
- A Framework for Comparing Password Guessing Strategies☆128Updated 6 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 3 years ago
- Cryptanalysis library for breaking classical ciphers☆28Updated 6 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆144Updated 2 years ago
- SCTP network scanner for discovery and security☆94Updated 4 years ago
- Sensor software☆68Updated 4 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- File transfer via DNS☆74Updated 8 years ago
- Secure SSH server using onion service.☆18Updated 9 years ago
- Copy of the contents at phrack.com☆40Updated 7 months ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 5 years ago
- ☆22Updated 9 years ago
- ☆90Updated 8 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- ☆50Updated 3 weeks ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Universal Plug and Fuzz☆41Updated 6 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago