wolf43 / AES-GCM-exampleLinks
An example of AES GCM encryption mode using Pycryptodome
☆26Updated 5 years ago
Alternatives and similar repositories for AES-GCM-example
Users that are interested in AES-GCM-example are comparing it to the libraries listed below
Sorting:
- New TLS Padding Oracles☆125Updated 2 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper☆17Updated 3 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- Sensor software☆68Updated 4 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆69Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆55Updated 9 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 3 years ago
- USB armory - hardware control tool☆34Updated 4 months ago
- ☆385Updated 13 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆156Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Rogue AP killer☆91Updated 7 years ago
- Cryptanalysis library for breaking classical ciphers☆27Updated 6 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- Secure SSH server using onion service.☆19Updated 9 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago
- SIM Card tunnel for Alcatel OT-918D☆38Updated 11 years ago
- ☆106Updated 9 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆89Updated 4 years ago
- SCTP network scanner for discovery and security☆94Updated 4 years ago
- ☆13Updated 8 years ago
- Facial Recognition and Steganography☆10Updated 6 years ago
- ☆45Updated this week
- IoT Penetration Testing Cookbook, published by Packt☆120Updated 2 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆68Updated 4 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago