Name: Ruhr University Bochum - Chair for Network and Data Security
Type: Organization
Bio: Research and development at the Chair for Network and Data Security concentrates on cryptographic protocols, Internet and XML security.
Location: Ruhr University Bochum
Blog: https://informatik.rub.de/nds/
Ruhr University Bochum - Chair for Network and Data Security's Projects
Breaking the security of Microsoft's RMS
Artifacts for the WOOT publication.
USENIX 2023 Artifacts
PDF Tester can be used to evaluate the signature status of a PDF document under different PDF applications.
Artifacts for the Black Hat talk.
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach to improve the security of OpenID Connect implementations by systematically detecting vulnerabilities.
REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to provide a framework for REST security research.
Implementation of ratcheted key exchange protocol (Poettering and Rösler, CRYPTO 2018, https://ia.cr/2018/296) by Marco Smeets
LaTeX Beamer Template for Ruhr-University Bochum
Simple XXE test suite generated specifically for SAML interfaces
Sec2 is a project funded by Federal Ministry of Education and Research: http://www.sec2.org
A Secure, Efficient, and Collaborative Real-Time Web Editor
Library to allow concurrent editing of XML documents using Operational Transforms based on ShareJS 0.6
A private messenger for Android.
SOAP webservices of different SOAP frameworks including samples for WS-Security.
Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.
A tool that can be used to learn state machines from implementations.
A Demonstrator for Collaborative Encrypted Editing
A Key Management Server for SyncEnc
This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".