☆13Apr 24, 2024Updated last year
Alternatives and similar repositories for sha_2_attack
Users that are interested in sha_2_attack are comparing it to the libraries listed below
Sorting:
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Dec 30, 2025Updated 2 months ago
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆40Mar 3, 2026Updated 2 weeks ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆37Jan 13, 2026Updated 2 months ago
- A basic verilog driver for the TM1638 LED and key matrix chip☆20Dec 22, 2017Updated 8 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- An implementation of the SHA-256 routine in C#.☆22Dec 8, 2013Updated 12 years ago
- Remove upvote and comment counts from Hacker News.☆16Jul 15, 2020Updated 5 years ago
- GreenTea is a basic cheat base for CS:GO, it has nothing but Paint Traverse hooked but is intended as a reference for the most basic of g…☆13Nov 4, 2020Updated 5 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- ☆44Dec 5, 2025Updated 3 months ago
- ☆11Nov 17, 2025Updated 4 months ago
- ElectroCardioGuard code (https://www.sciencedirect.com/science/article/pii/S0950705123007645, https://arxiv.org/abs/2306.06196)☆11Aug 30, 2024Updated last year
- Web server to receive uploaded LaTeX and execute it in a docker container.☆16Updated this week
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- A free and open-source API to fetch dad-jokes☆26Oct 4, 2024Updated last year
- An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks☆12Nov 12, 2024Updated last year
- ☆33Sep 29, 2025Updated 5 months ago
- ☆15May 6, 2022Updated 3 years ago
- JavaScript implementation of the NIST Statistical Test Suite for Random and Pseudorandom Number Generators☆13Jan 28, 2024Updated 2 years ago
- Calculate the AES-128 key schedule given any round key☆51Jan 26, 2024Updated 2 years ago
- ☆10Apr 18, 2017Updated 8 years ago
- Help me analyze bandaged Rubik's cubes.☆12Nov 30, 2020Updated 5 years ago
- An open source project for study S-boxes☆45Sep 28, 2022Updated 3 years ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11May 11, 2024Updated last year
- ☆10Apr 10, 2020Updated 5 years ago
- yosys, nextpnr, apicula and openFPGALoader in vscode using OSS-CAD-Suite☆39Jul 6, 2024Updated last year
- Have an LLM write your biography, probably incorrectly☆14Dec 26, 2024Updated last year
- A very basic example of how to use go generate☆11Jun 22, 2015Updated 10 years ago
- A tool for converting C/C++ header files to Cython header files☆16Apr 10, 2024Updated last year
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- ☆13Oct 7, 2019Updated 6 years ago
- Similator for cryptopools written in C++☆20Mar 11, 2026Updated last week
- AVX implementation of the Skinny block cipher☆11Apr 24, 2022Updated 3 years ago
- Prediction algorithms for the PCG pseudo-random generator☆15Nov 13, 2020Updated 5 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Tool to test networking protocols in diverse topologies and conditions.☆17Nov 6, 2025Updated 4 months ago
- Hardware designs for fault detection☆20Apr 13, 2020Updated 5 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- ☆13Mar 3, 2021Updated 5 years ago