wolf43 / AES-GCM-example
An example of AES GCM encryption mode using Pycryptodome
☆25Updated 4 years ago
Alternatives and similar repositories for AES-GCM-example:
Users that are interested in AES-GCM-example are comparing it to the libraries listed below
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆41Updated 5 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- ☆13Updated 7 years ago
- ☆13Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Python wrapper for the OnionOO tor status API☆33Updated 7 years ago
- ☆19Updated 11 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 8 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆38Updated 4 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- A collection of captured SSH login credentials☆16Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 7 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆16Updated 5 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Copy of the contents at phrack.com☆38Updated 2 weeks ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- ☆44Updated last month
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago