Fackelmann / SHA3Links
C implementation of SHA3 (Keccak)
☆21Updated 4 years ago
Alternatives and similar repositories for SHA3
Users that are interested in SHA3 are comparing it to the libraries listed below
Sorting:
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 6 years ago
- LLVM pass that detects one undefined behavior, and emits code to delete your hard drive☆33Updated 5 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
- collection of scripts and stuff☆12Updated 9 years ago
- GNU Crypto library☆35Updated 14 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Updated 12 years ago
- Recover control flow graph from obfuscated codes☆39Updated 10 years ago
- Research of CVE-2014-3153 and its famous exploit towelroot on x86☆46Updated 11 years ago
- IDA recompiler☆31Updated 10 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 7 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- Fetch and set configuration values for IDA Plugins☆24Updated 3 weeks ago
- (ARM Thumb) Re-Assembler utility for reverse engineering☆17Updated 7 years ago
- libs2e.so☆19Updated 4 years ago
- Dynamic binary analysis via platform emulation☆12Updated 7 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Updated 11 years ago
- Python bindings for the Hexrays Decompiler☆88Updated 3 years ago
- PIN tool runtracer suite☆44Updated 10 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Updated 12 years ago
- Patches to the Nexus 6 (Shamu) kernel source to allow KGDB over serial debug cable☆32Updated 6 years ago
- IDA scripts that facilitate reverse engineering☆16Updated 9 years ago
- Original code about binary encryption from phrack☆72Updated 13 years ago
- CVE-2013-6282 exploit☆27Updated 12 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Updated 10 years ago
- A GCC plugin implementing various stack canaries.☆14Updated 13 years ago
- ☆19Updated 8 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Updated 11 years ago
- IDA Python Scripts☆46Updated 16 years ago