Rupan / blowfishView external linksLinks
Blowfish crypto implementation
☆37Dec 10, 2010Updated 15 years ago
Alternatives and similar repositories for blowfish
Users that are interested in blowfish are comparing it to the libraries listed below
Sorting:
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- easy_Pwn☆19Apr 19, 2019Updated 6 years ago
- 参考taviso的代码逆向一下mpengine.dll☆20Jun 30, 2022Updated 3 years ago
- Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆21Apr 15, 2023Updated 2 years ago
- 💀 Linux local root exploit for CVE-2018-18955☆21Jan 20, 2022Updated 4 years ago
- ☆24Aug 21, 2023Updated 2 years ago
- Bypassing kernel patch protection runtime☆21Feb 19, 2023Updated 2 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆28Apr 15, 2023Updated 2 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last week
- Unofficial LibGCrypt with added custom native Visual Studio project build tools. LibGCrypt: Libgcrypt is a general purpose cryptographic …☆31Jan 26, 2026Updated 2 weeks ago
- Modified Il2CppDumper source for codm (last working: 1.0.48)☆14Aug 31, 2024Updated last year
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Jan 11, 2018Updated 8 years ago
- IOS PUBG AUTO UPDATE ESP AIMBOT ALL VERSIONS☆15Nov 14, 2023Updated 2 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆14Mar 12, 2025Updated 11 months ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- Bedrock Finder for Java Minecraft 1.12 - 1.17☆13Oct 20, 2022Updated 3 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Python library for Alphanov's PDM laser sources control☆13Jan 16, 2026Updated 3 weeks ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Yet another AIDA64 Sensor Panel☆10Aug 21, 2021Updated 4 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Convert mai2touch serial data to 'old cab' maimai game(e.g. maimai FiNALE) touch, auto pass start check.☆17Oct 12, 2025Updated 4 months ago
- Dump unpacked dex, trace/intercept Java/native function. Frida + adb + React +Django☆42Aug 25, 2020Updated 5 years ago
- MetroHash v1: Exceptionally fast and statistically robust hash functions☆10Apr 10, 2025Updated 10 months ago
- GUI for SymbiYosys☆17Oct 13, 2025Updated 4 months ago
- ☆17Jan 6, 2024Updated 2 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆15Jan 6, 2026Updated last month
- Environment for CVE-2018-1273 (Spring Data Commons)☆10Aug 15, 2018Updated 7 years ago
- Fast poor man's profiler for Linux☆12Jun 8, 2023Updated 2 years ago
- M-Visor is a virtualization framework that embeds a (Ring -2 layer) "SMM" inside the BIOS & WIndows. It uses CPU-native virtualization (I…☆25Dec 8, 2025Updated 2 months ago
- WinDbg cheat sheet☆16May 10, 2023Updated 2 years ago
- JS implementation of Unity AssetBundle unpacking☆14Oct 19, 2025Updated 3 months ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 4 months ago
- A very simple App to check if a App is installed or if a File Path is valid.☆23Jun 2, 2025Updated 8 months ago
- The labs of ARC university courses☆12Aug 29, 2023Updated 2 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- Fast Setup for Proof by Reflection, in Two Lines of Ltac.☆14Jan 12, 2021Updated 5 years ago