{"id":26779166,"url":"https://github.com/deltatecs/voses","last_synced_at":"2025-06-15T22:33:40.167Z","repository":{"id":282305708,"uuid":"942931944","full_name":"DeltaTecs/VoSeS","owner":"DeltaTecs","description":"Volatile Secret Searcher - massively parallel, brute force memory dump analysis for (D)TLS secret extraction","archived":false,"fork":false,"pushed_at":"2025-03-28T16:50:56.000Z","size":129,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-28T17:45:36.270Z","etag":null,"topics":["cuda","memory-hacking","reverse-engineering","tls"],"latest_commit_sha":null,"homepage":"","language":"Cuda","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/DeltaTecs.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-03-04T22:58:21.000Z","updated_at":"2025-03-28T16:51:00.000Z","dependencies_parsed_at":"2025-03-13T23:45:10.358Z","dependency_job_id":null,"html_url":"https://github.com/DeltaTecs/VoSeS","commit_stats":null,"previous_names":["deltatecs/voses"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DeltaTecs%2FVoSeS","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DeltaTecs%2FVoSeS/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DeltaTecs%2FVoSeS/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DeltaTecs%2FVoSeS/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/DeltaTecs","download_url":"https://codeload.github.com/DeltaTecs/VoSeS/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246145085,"owners_count":20730495,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cuda","memory-hacking","reverse-engineering","tls"],"created_at":"2025-03-29T06:15:03.094Z","updated_at":"2025-03-29T06:15:03.661Z","avatar_url":"https://github.com/DeltaTecs.png","language":"Cuda","readme":"# VoSeS\nVolatile Secret Searcher - massively parallel, brute force memory dump analysis for (D)TLS 1.2 secret extraction\n\nYou have:\n- A wireshark capture file of application traffic\n- A memory dump of the machine that was made while the application ran\nand you want to decrypt the application traffic?\n\nThen this tool works for you. Requirements:\n- CUDA capable device * happy jensen noises *\n- the traffic must be encrypted with tls 1.2 or dtls 1.2\n- this tool supports only GCM_AES_128_SHA_256 and GCM_AES_256_SHA_384 encryption\n\nCompile on windows:\n1. `mkdir build`\n2. `cd build`\n3. `cmake ..`\n4. `cmake --build .`\n\nRun:\n```\nvoses.exe\n  --client_random|-cr \u003c32-byte hex\u003e\n  --server_random|-sr \u003c32-byte hex\u003e\n  --client_finished|-cf \u003chex, max 61 bytes\u003e\n  --algorithm|-a \u003cgcm_256_sha_384|gcm_128_sha_256\u003e\n  --haystack|-h \u003cpath\u003e  (memory dump file path)\n  [--entropy|-e \u003cfloat\u003e]\n  [--entropy-scan|-es]\n```\n\nset entropy to a different filter value if you like. scan will show you how many 48 byte locations match your filter.\n\nWhen a master secret matching your randoms and cipher text is found it will be printed in a format that can be read by wireshark as a master secret log file.\n\nThis tool uses a custom cuda port based on the AES implementation of https://github.com/kokke/tiny-AES-c\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdeltatecs%2Fvoses","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdeltatecs%2Fvoses","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdeltatecs%2Fvoses/lists"}