wolf43 / AES-GCM-exampleLinks
An example of AES GCM encryption mode using Pycryptodome
☆25Updated 5 years ago
Alternatives and similar repositories for AES-GCM-example
Users that are interested in AES-GCM-example are comparing it to the libraries listed below
Sorting:
- Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper☆17Updated 3 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆74Updated 6 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 7 years ago
- Certificate Fuzzer based on the work by Johannes Roth (cryptosource)☆13Updated 5 years ago
- Python wrapper for the OnionOO tor status API☆32Updated 8 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- A Framework for Comparing Password Guessing Strategies☆127Updated 6 years ago
- File transfer via DNS☆73Updated 8 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆152Updated 7 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- SECCURE compatible Elliptic Curve cryptography in Python☆94Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Cryptanalysis library for breaking classical ciphers☆27Updated 6 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆16Updated 10 years ago
- ☆48Updated 2 weeks ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 11 years ago
- (Abandoned) Extract packages from an Android device☆52Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Embedded AppSec Best Practices☆41Updated 2 years ago
- Bluetooth reverse shell.☆15Updated 4 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- Copy of the contents at phrack.com☆40Updated 5 months ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- SCTP network scanner for discovery and security☆94Updated 3 years ago
- Scapy Penetration testing scripts☆21Updated 10 years ago