Fackelmann / SHA3
C implementation of SHA3 (Keccak)
☆21Updated 3 years ago
Alternatives and similar repositories for SHA3:
Users that are interested in SHA3 are comparing it to the libraries listed below
- GNU Crypto library☆34Updated 13 years ago
- ☆11Updated 9 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- android kernel disassembler based on MAME emulator code☆39Updated 11 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆27Updated 9 years ago
- CVE-2014-3153 exploit☆18Updated 9 years ago
- PE file parser☆37Updated 9 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- CVE-2015-1805 root tool☆13Updated 5 years ago
- dll injection library☆9Updated 10 years ago
- Toy framework for creating a VPN☆17Updated 13 years ago
- ☆17Updated 10 years ago
- -- a little and powerful object file manipulation tool.☆28Updated 7 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆135Updated 7 years ago
- Visualize an ELF's execution☆10Updated 10 years ago
- Disassemble ARM compiled code to return the original source code☆23Updated 3 years ago
- Diary of a reverse-engineer☆39Updated 7 years ago
- Security-Oriented Analysis of Application Programs☆13Updated 6 years ago
- A toy Linux rootkit.☆13Updated 11 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- Sequitur (context free grammar) fuzzer, maximum code coverage/set covering, plus other tools.