Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack aes
aes
x
attack
x
39 search results found
Awesome Crypto Papers
⭐
1,518
A curated list of cryptography papers, articles, tutorials and howtos.
Deadpool
⭐
598
Repository of various public white-box cryptographic implementations and their practical attacks.
Keyshuffling
⭐
340
Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain
Whitebox Crypto Aes
⭐
291
Whitebox AES implementation in C++. Chow, Karroumi.
Padding Oracle Attacker
⭐
150
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
Tps2017
⭐
144
Results of the Public Security Tests of the Brazilian voting system – 2017
Nonce Disrespect
⭐
102
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Ctf Crypto Writeups
⭐
100
Dissentr
⭐
100
Truecrack
⭐
95
TrueCrack is a brute-force password cracker for TrueCrypt (Copyrigth) volumes. It works on Linux and it is optimized for Nvidia Cuda technology.
Damnvulnerablecryptoapp
⭐
81
An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit more about crypto, without the need to dive deep into the math behind it
Tools For Cryptanalysis
⭐
79
A repository that aims to provide tools for cryptography and cryptanalysis
Sca Dpa
⭐
35
Side channel attack (SCA) of AES with Differential Power Analysis (DPA)
Zipeinfo
⭐
26
ZIP encryption info
Backdoorbash
⭐
24
Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)
Py Convergent Encryption
⭐
19
Convergent encryption library, encrypts with AES 256 CTR using the SHA256d hash of the plain text as key.
Snmpplux
⭐
19
An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpp
Xlate
⭐
18
Code to evaluate XLATE attacks as well existing cache attacks.
Conncrypt
⭐
18
Symmetrically encrypt your Go net.Conns
Pbcs
⭐
17
Sgx Timing
⭐
15
First practical showcase for leaking secret encryption keys from a secure SGX enclave.
Second Order Dpa
⭐
14
An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
Keycommitment
⭐
13
Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456
Aes_padding_oracle_attack
⭐
10
Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).
Aes Cpa
⭐
9
CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)
Padoracle
⭐
9
Padding Oracle Attack with Node.js
Hulk
⭐
8
Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI
Crypot
⭐
8
Library of Crypto exploits
Gocw
⭐
8
go library for ChipWhisperer hardware security platform
White Box Masking
⭐
7
A White-Box Masking Scheme Against Computational and Algebraic Attacks
Moderncryptolib
⭐
7
Python cryptography library
Aes Ctr Padding Attack
⭐
6
Golang programs for AES-CTR mode encryption with 2 different hashing algorithm and Padding Oracle attack on AES-CTR mode.
Arduino Nfc Sec 01
⭐
6
Arduino library that implements the NFC-SEC Cryptography Standard using ECDH and AES (more or less)
Stanford Cryptography
⭐
6
Programming assignments for Coursera Cryptography I by Stanford University
Secure Can Demo
⭐
6
Implementation of secure CAN network in "Power Analysis and Fault Attacks against Secure CAN: How Safe Are Your Keys?".
Coldboot
⭐
5
Hardware Accelerated Cold-Boot Attacks
Shiroexplore
⭐
5
Lagrange
⭐
5
Cryptanalysis on differents algorithms with z3 solver sat
Jlsca Cw
⭐
5
This is a project serves as a front end for the Jlsca. It enables the user to automate the analysis part of correlation power analysis (CPA) using ChipWhisperer power traces and the Jlsca analysis software.
Jldfa
⭐
5
DFA scripts using Jlsca
Related Searches
Python Attack (2,252)
Encryption Aes (1,141)
Javascript Attack (693)
Attack Adversarial (590)
Cryptography Aes (564)
Python Aes (549)
Security Attack (533)
C Attack (491)
Aes Rsa (464)
Java Aes (416)
1-39 of 39 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.