ALRBP / Attack-Argon2iLinks
An effective attack against the Argon2i hash function
☆9Updated 7 years ago
Alternatives and similar repositories for Attack-Argon2i
Users that are interested in Attack-Argon2i are comparing it to the libraries listed below
Sorting:
- ☆36Updated 12 years ago
- ☆15Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- ☆17Updated 10 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Toolset to analyse TLS datasets☆12Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 5 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- Quantum Insert/FoxAcid case study☆15Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- ☆24Updated 9 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- free crypto audit☆31Updated 8 years ago
- Web of trust grapher☆38Updated last week