All Projects → sgx-tutorial-space18 → Similar Projects or Alternatives

129 Open source projects that are alternatives of or similar to sgx-tutorial-space18

inclavare-containers
A novel container runtime, aka confidential container, for cloud-native confidential computing and enclave runtime ecosystem.
Stars: ✭ 510 (+1059.09%)
Mutual labels:  sgx, enclave
confidential-computing-zoo
Confidential Computing Zoo provides confidential computing solutions based on Intel SGX, TDX, HEXL, etc. technologies.
Stars: ✭ 177 (+302.27%)
Mutual labels:  sgx, enclave
Padding Oracle Attack
🔓 Padding oracle attack against PKCS7 🔓
Stars: ✭ 209 (+375%)
Mutual labels:  attack
CCATK
高度自动化CC脚本
Stars: ✭ 107 (+143.18%)
Mutual labels:  attack
Diffai
A certifiable defense against adversarial examples by training neural networks to be provably robust
Stars: ✭ 171 (+288.64%)
Mutual labels:  attack
Armor
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (+418.18%)
Mutual labels:  attack
deauther
An interactive command-line deauther for macOS.
Stars: ✭ 70 (+59.09%)
Mutual labels:  attack
Attack Defense Framework
🚩 A framework for CTF Attack with Defense Mode
Stars: ✭ 183 (+315.91%)
Mutual labels:  attack
hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+1963.64%)
Mutual labels:  attack
Wreckuests
Yet another one hard-hitting tool to run HTTP stress tests 🌌
Stars: ✭ 137 (+211.36%)
Mutual labels:  attack
rhme-2016
The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition provides a completely different set of new challenges to test your skills in side channel, fault injection, cryptoanalysis and software exploitation attacks.
Stars: ✭ 42 (-4.55%)
Mutual labels:  side-channel
Nailgun
Nailgun attack on ARM devices.
Stars: ✭ 114 (+159.09%)
Mutual labels:  attack
aws-nitro-enclaves-sdk-c
This repo provides a C API for AWS Nitro Enclaves, including a KMS SDK that integrates it with attestation.
Stars: ✭ 73 (+65.91%)
Mutual labels:  enclave
Z0172CK-Tools
Hacking Tools Z0172CK
Stars: ✭ 31 (-29.55%)
Mutual labels:  attack
Arduinoarpspoof
Kicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.
Stars: ✭ 215 (+388.64%)
Mutual labels:  attack
opaque-sql
An encrypted data analytics platform
Stars: ✭ 169 (+284.09%)
Mutual labels:  enclave
Camerattack
An attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Stars: ✭ 192 (+336.36%)
Mutual labels:  attack
Cheat-Sheet---Active-Directory
This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: ✭ 154 (+250%)
Mutual labels:  attack
Adversarial Robustness Toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+5895.45%)
Mutual labels:  attack
refluxion
Refluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-43.18%)
Mutual labels:  attack
Instahack
Best Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (+215.91%)
Mutual labels:  attack
spectre-attack-demo
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Stars: ✭ 87 (+97.73%)
Mutual labels:  attack
Free adv train
Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Stars: ✭ 127 (+188.64%)
Mutual labels:  attack
Penglai-Enclave
This is the main repo for Penglai.
Stars: ✭ 47 (+6.82%)
Mutual labels:  enclave
Wifiphisher
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+23384.09%)
Mutual labels:  attack
meta-secure-core
OpenEmbedded layer for the use cases on secure boot, integrity and encryption
Stars: ✭ 80 (+81.82%)
Mutual labels:  sgx
Nonce Disrespect
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (+134.09%)
Mutual labels:  attack
Mitm
Man in the middle tool
Stars: ✭ 30 (-31.82%)
Mutual labels:  attack
crust-sworker
sWorker(storage worker) is an offchain storage work inspector of Crust MPoW protocol running inside TEE enclave
Stars: ✭ 30 (-31.82%)
Mutual labels:  sgx
md5-extension-attack
MD5长度扩展攻击
Stars: ✭ 36 (-18.18%)
Mutual labels:  attack
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+70.45%)
Mutual labels:  attack
Intruderpayloads
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+6215.91%)
Mutual labels:  attack
byeintegrity2-uac
Bypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (+4.55%)
Mutual labels:  attack
Spectre Attack Sgx
Spectre attack against SGX enclave
Stars: ✭ 214 (+386.36%)
Mutual labels:  attack
DNS-Fender
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (+6.82%)
Mutual labels:  attack
Hiddeneye Legacy
Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
Stars: ✭ 2,568 (+5736.36%)
Mutual labels:  attack
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1436.36%)
Mutual labels:  attack
Snmpwn
An SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (+315.91%)
Mutual labels:  attack
jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (+86.36%)
Mutual labels:  attack
Bkcrack
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Stars: ✭ 178 (+304.55%)
Mutual labels:  attack
python-sgx
Python interface to the SGX SDK
Stars: ✭ 29 (-34.09%)
Mutual labels:  sgx
Killchain
A unified console to perform the "kill chain" stages of attacks.
Stars: ✭ 172 (+290.91%)
Mutual labels:  attack
sidefuzz
Fuzzer to automatically find side-channel (timing) vulnerabilities
Stars: ✭ 94 (+113.64%)
Mutual labels:  side-channel
Atomicpurpleteam
Atomic Purple Team Framework and Lifecycle
Stars: ✭ 155 (+252.27%)
Mutual labels:  attack
cpu-load-side-channel
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Stars: ✭ 45 (+2.27%)
Mutual labels:  side-channel
Cc Attack
Using Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
Stars: ✭ 145 (+229.55%)
Mutual labels:  attack
byeintegrity3-uac
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-45.45%)
Mutual labels:  attack
Confusable homoglyphs
ϲοnfuѕаblе_һοmоɡlyphs
Stars: ✭ 130 (+195.45%)
Mutual labels:  attack
jlsca-tutorials
Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia
Stars: ✭ 43 (-2.27%)
Mutual labels:  side-channel
Jlsca
Side-channel toolkit in Julia
Stars: ✭ 114 (+159.09%)
Mutual labels:  attack
Misp Maltego
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (+154.55%)
Mutual labels:  attack
SecretNetwork
𝕊 The Secret Network
Stars: ✭ 466 (+959.09%)
Mutual labels:  sgx
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+3063.64%)
Mutual labels:  attack
dos-attack
The program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
Stars: ✭ 28 (-36.36%)
Mutual labels:  attack
TIGER
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (+134.09%)
Mutual labels:  attack
sgxwallet
sgxwallet is the first-ever opensource high-performance hardware secure crypto wallet that is based on Intel SGX technology. First opensource product on Intel SGX whitelist. Scales to 100,000+ transactions per second. Currently supports ETH and SKALE, and will support BTC in the future. Sgxwallet is under heavy development and use by SKALE network.
Stars: ✭ 50 (+13.64%)
Mutual labels:  sgx
WPCracker
WordPress pentest tool
Stars: ✭ 34 (-22.73%)
Mutual labels:  attack
assap
Anti Shoulder Surfing Attack Platform (ASSAP)
Stars: ✭ 22 (-50%)
Mutual labels:  attack
Deautherdroid
Additional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (+111.36%)
Mutual labels:  attack
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+222.73%)
Mutual labels:  attack
1-60 of 129 similar projects