Sc00bz / break-uheprngLinks
Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)
☆11Updated 7 years ago
Alternatives and similar repositories for break-uheprng
Users that are interested in break-uheprng are comparing it to the libraries listed below
Sorting:
- A tiny, portable implementation of the IPCrypt specification in C.☆31Updated last month
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 5 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Updated 5 years ago
- chroot environments, done in a more elegant way☆11Updated last year
- data-at-rest updatable threshold encryption KMS server and client☆21Updated 3 weeks ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 7 months ago
- QARMA block cipher in C☆31Updated 3 years ago
- Intro to Assembly Optimization stream repo☆26Updated 4 years ago
- ☆30Updated 7 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- MSIEVE: A Library for Factoring Large Integers☆13Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 4 months ago
- A tweakable block cipher☆31Updated last year
- Tracks runtime instruction execution in Linux programs☆35Updated 12 years ago
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- iTLB multihit PoC☆42Updated 2 years ago
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆20Updated 11 months ago
- A possible method for faster-than-light communication☆43Updated last year
- just give me a unix shell☆35Updated 3 years ago
- Minimal setup to trigger the xz backdoor☆28Updated last year
- encrypted-linux-kernel-modules☆12Updated 5 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Phorklift is an HTTP server and proxy daemon, with clear, powerful and dynamic configuration.☆45Updated 4 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Architectural privilege escalation on x86☆59Updated 7 years ago
- ☆11Updated 6 years ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 7 months ago