wolf43 / AES-GCM-exampleLinks
An example of AES GCM encryption mode using Pycryptodome
☆25Updated 4 years ago
Alternatives and similar repositories for AES-GCM-example
Users that are interested in AES-GCM-example are comparing it to the libraries listed below
Sorting:
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 8 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆15Updated 10 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆41Updated 5 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- A Tamarin model and analysis of EMV☆33Updated 4 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- ☆13Updated 8 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- ☆44Updated 2 weeks ago
- NCC Group Open Source RF Security Testing Methodology☆91Updated 3 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆22Updated 8 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆41Updated 4 years ago
- Jaqen - Simple DNS rebinding☆72Updated 7 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Embedded AppSec Best Practices☆41Updated 2 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 5 years ago
- ☆20Updated 11 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 4 years ago
- USB armory - hardware control tool☆32Updated 5 months ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆54Updated 8 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago