Sc00bz / break-uheprngLinks
Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)
☆11Updated 7 years ago
Alternatives and similar repositories for break-uheprng
Users that are interested in break-uheprng are comparing it to the libraries listed below
Sorting:
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆28Updated last month
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 4 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- chroot environments, done in a more elegant way☆11Updated last year
- ☆30Updated 7 years ago
- ☆12Updated 3 years ago
- ☆11Updated 2 years ago
- ARM is Turing-complete without data fetches☆57Updated 7 years ago
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆20Updated 11 months ago
- data-at-rest updatable threshold encryption KMS server and client☆21Updated this week
- Minimal setup to trigger the xz backdoor☆28Updated last year
- iTLB multihit PoC☆42Updated last year
- Phorklift is an HTTP server and proxy daemon, with clear, powerful and dynamic configuration.☆45Updated 4 years ago
- Debugger and analyzer for ARM ELF executables.☆18Updated 3 years ago
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 7 months ago
- A simple, decompressing executable packer☆45Updated 3 years ago
- A tweakable block cipher☆31Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- Elven relativism -- relocation and execution of aarch64 ELF relocatable objects (ET_REL)☆21Updated 2 weeks ago
- Architectural privilege escalation on x86☆59Updated 7 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- executing JS from x86 code☆27Updated 6 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- 100% XXTEA authenticated, chunked file encryption☆18Updated 4 years ago
- A collection of interesting ELF files for inspiration and testing☆30Updated 2 years ago
- Tracks runtime instruction execution in Linux programs☆35Updated 12 years ago