Fackelmann / SHA3Links
C implementation of SHA3 (Keccak)
☆21Updated 4 years ago
Alternatives and similar repositories for SHA3
Users that are interested in SHA3 are comparing it to the libraries listed below
Sorting:
- LLVM pass that detects one undefined behavior, and emits code to delete your hard drive☆35Updated 5 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 6 years ago
- A hobby os kernel on i386 arch.☆29Updated 13 years ago
- libs2e.so☆19Updated 5 years ago
- Dynamic instrumentation of the Linux kernel☆41Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Updated 9 years ago
- Some tools☆10Updated 8 years ago
- collection of scripts and stuff☆12Updated 9 years ago
- Android runtime jit binary file parser☆13Updated 8 years ago
- S2E Core Engine Library☆15Updated 6 years ago
- IDA recompiler☆31Updated 11 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Python bindings for the Hexrays Decompiler☆88Updated 4 years ago
- Toy project for static analysis of ELF binaries☆29Updated 8 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 7 years ago
- A simple low-level implementation of TCP/IPv6 Stack.☆16Updated 10 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- Course project to insert a backdoor into an open source compiler (Ken Thompson’s Reflections on Trusting Trust)☆103Updated 11 years ago
- A Linux kernel module that locates the system call table in memory and hooks uname. Contributions welcome!☆57Updated 12 years ago
- radare2 cLEMENCy plugins☆24Updated 8 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Updated 7 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 8 years ago
- ☆23Updated 10 years ago
- Diary of a reverse-engineer☆39Updated 7 years ago
- Research of CVE-2014-3153 and its famous exploit towelroot on x86☆46Updated 11 years ago
- Fetch and set configuration values for IDA Plugins☆25Updated last month
- [Not work] Deobfuscate obfuscated binaries!☆11Updated 9 years ago
- Original code about binary encryption from phrack☆71Updated 13 years ago