Python cryptography and cryptanalysis library. 100% Python code. Implementations from official standards (ANSI, FIPS, etc.). Also some cryptanalytic attacks included.
-
Updated
May 7, 2022 - Python
Python cryptography and cryptanalysis library. 100% Python code. Implementations from official standards (ANSI, FIPS, etc.). Also some cryptanalytic attacks included.
A Comparison of SAT-Solver attacks on NIST lightweight Hash Candidates with state of the art Brute-Force attacks.
Web UI for the Simple Guardian
Fork: added openvpn port-share-redirect to attack parser (MERGED upstream: https://bitbucket.org/sshguard/sshguard)
A very simple firewall for WordPress that allows you to see all real requests to your WordPress and protect you from Internet attacks. It’s a WAF, a Web Application Firewall that is installed in front of WordPress. It’s installed in the server with the plugin, and it checks requests from the web browsers, bots or webcrawlers to your WordPress. I…
Random Input Attacker (Acceptance Region) evaluation of touch authentication
List of detected IP addresses as offenders.
Our project is about: Attacks on Healthcare Facilities
Adversarial Attack Datasets for Environmental Sound Classification
A curated list of awesome Rowhammer papers, tools, and info resources. 👉 Content coming soon, stay tuned!
This study explores the vulnerability of the Federated Learning (FL) model where a portion of clients participating in the FL process is under the control of adversaries who don’t have access to the training data but can access the training model and its parameters.
A cryptography package with simplifed versions of AES and SHA-1, RSA, HMAC; featuring attacks, block ciphers and digital signature schemes.
The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks
Detect advanced HTML injection attacks on vulnerable websites
Random Input Attacker (Acceptance Region) evaluation of voice authentication
Python script used to import a (more or less) large amount of application, attacks or malware into a Spirent CyberFlood controller.
Cryptanalysis et cryptographical attacks on different algorithms 🔓
This repository contains experiments for Masters Thesis of Computer Science on AGH University of Science. Topic of thesis was Attacks on image-processing neural networks. Backdoor patch attack was carried out on three neural networks trained with use of transfer learning. Attacks were launched with use of static and adaptive adversarial patches …
Add a description, image, and links to the attacks topic page so that developers can more easily learn about it.
To associate your repository with the attacks topic, visit your repo's landing page and select "manage topics."