{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"fuzzomatic","owner":"kudelskisecurity","isFork":false,"description":"Automatically fuzz Rust projects from scratch","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":53,"forksCount":2,"license":"GNU General Public License v3.0","participation":[0,0,0,0,0,0,1,0,13,26,5,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,4,3,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-06T13:25:47.560Z"}},{"type":"Public","name":"luks2_patcher","owner":"kudelskisecurity","isFork":false,"description":"LUKS2 header patcher tool","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,5,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-07T12:26:21.496Z"}},{"type":"Public","name":"ecdsa-polynomial-nonce-recurrence-attack","owner":"kudelskisecurity","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":3,"starsCount":86,"forksCount":21,"license":"GNU General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-10T11:31:36.317Z"}},{"type":"Public","name":"chainoffools","owner":"kudelskisecurity","isFork":false,"description":"A PoC for CVE-2020-0601","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":337,"forksCount":88,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-09T14:27:33.273Z"}},{"type":"Public","name":"ecdsa-dump-tls","owner":"kudelskisecurity","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":12,"forksCount":4,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-24T13:58:03.206Z"}},{"type":"Public","name":"ecdsa-dump-ethereum","owner":"kudelskisecurity","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":10,"forksCount":5,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-15T14:04:09.567Z"}},{"type":"Public","name":"volatility-gpg","owner":"kudelskisecurity","isFork":false,"description":"Volatility3 plugin to extract secrets from gpg-agent","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":8,"forksCount":0,"license":"GNU General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-13T13:22:12.026Z"}},{"type":"Public","name":"efs2_extractor","owner":"kudelskisecurity","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-21T13:51:41.156Z"}},{"type":"Public","name":"quecloader","owner":"kudelskisecurity","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-21T08:16:03.457Z"}},{"type":"Public","name":"nist-lwc-power-analysis","owner":"kudelskisecurity","isFork":false,"description":"Power Analysis Attacks of some of the finalists to the NIST Lightweight Cryptography Contest, implemented in Python on the ChipWhisperer framework","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-03T22:01:19.946Z"}},{"type":"Public","name":"fumblechain","owner":"kudelskisecurity","isFork":false,"description":"A Purposefully Vulnerable Blockchain","allTopics":["python","education","blockchain","ctf-challenges"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":50,"forksCount":9,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-04-29T13:37:44.611Z"}},{"type":"Public","name":"dangerous-ocsp-delegated-responder-cert-poc","owner":"kudelskisecurity","isFork":false,"description":"Proof-of-concept for the new solution to the curious case of the dangerous delegated responder certificate","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-11-16T07:04:25.366Z"}},{"type":"Public","name":"binaryninja_cortex","owner":"kudelskisecurity","isFork":false,"description":"A Binary Ninja plugin to load Cortex-based MCU firmware","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":1,"starsCount":20,"forksCount":10,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-07-01T14:26:12.879Z"}},{"type":"Public","name":"lecroy2sigrok","owner":"kudelskisecurity","isFork":false,"description":"Convert a Lecroy waveform to sigrok analog data","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":1,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-10-30T19:04:43.388Z"}},{"type":"Public","name":"hlf-cfg-gen","owner":"kudelskisecurity","isFork":false,"description":"Hyperledger Fabric config generator","allTopics":["jinja2","blockchain","hyperledger"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-09-10T08:18:45.830Z"}},{"type":"Public","name":"k-reaper","owner":"kudelskisecurity","isFork":false,"description":"Public key reaping machine","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":5,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-09-03T07:48:36.225Z"}},{"type":"Public","name":"EdDSA-fault-attack","owner":"kudelskisecurity","isFork":false,"description":"Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.","allTopics":["cryptography","research","hardware-security","attack","arduino-nano","eddsa","faulted-signatures","fault-attack"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":69,"forksCount":5,"license":"The Unlicense","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-05T07:21:48.584Z"}},{"type":"Public","name":"IR_ThreatIntel_DomainGatherAggregator","owner":"kudelskisecurity","isFork":false,"description":"This script was created out of the need to collect open source malicious domain(s) for use with Threat Intel application and proactive containment strategies (like DNS Sink-holing). ","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":3,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-08-29T17:59:46.310Z"}},{"type":"Public","name":"check_all_apks","owner":"kudelskisecurity","isFork":false,"description":"Check All APK's -- scripts for checking your phone for malware","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":31,"forksCount":11,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-08-08T06:34:47.888Z"}},{"type":"Public","name":"cryptochallenge17","owner":"kudelskisecurity","isFork":false,"description":"Kudelski Security's 2017 crypto challenge ","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":20,"forksCount":4,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-07-06T12:05:26.341Z"}},{"type":"Public","name":"sgxfun","owner":"kudelskisecurity","isFork":false,"description":"SGX command-line tools and paper","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":146,"forksCount":22,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-08-04T15:42:39.923Z"}},{"type":"Public","name":"nexpose","owner":"kudelskisecurity","isFork":false,"description":"python interface to nexpose (API 1.1, 1.2)","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-06-17T13:37:21.104Z"}},{"type":"Public","name":"nessus","owner":"kudelskisecurity","isFork":false,"description":"python interface to nessus","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-06-17T13:36:11.317Z"}},{"type":"Public","name":"burp","owner":"kudelskisecurity","isFork":false,"description":"python interface to burp","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-06-17T13:35:18.145Z"}},{"type":"Public","name":"Dridex-config-extraction","owner":"kudelskisecurity","isFork":false,"description":"Static extraction of dridex malware configuration","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":18,"forksCount":5,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-11-02T16:38:40.817Z"}},{"type":"Public","name":"ipcrypt","owner":"kudelskisecurity","isFork":true,"description":"IP-format-preserving encryption, with a dedicated 4-byte cipher","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":16,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-03-25T19:42:08.926Z"}},{"type":"Public","name":"blueflower","owner":"kudelskisecurity","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":22,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-02-20T07:12:43.196Z"}},{"type":"Public","name":"Volatility-plugins","owner":"kudelskisecurity","isFork":false,"description":"Volatility plugins","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":12,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-02-19T20:45:01.801Z"}}],"repositoryCount":28,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"kudelskisecurity repositories"}