Sc00bz / break-uheprngLinks
Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)
☆11Updated 7 years ago
Alternatives and similar repositories for break-uheprng
Users that are interested in break-uheprng are comparing it to the libraries listed below
Sorting:
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 5 years ago
- chroot environments, done in a more elegant way☆11Updated last year
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆20Updated 8 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆14Updated last year
- ☆30Updated 6 years ago
- A tiny library to properly encrypt IP addresses.☆20Updated last month
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 4 months ago
- ☆12Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 2 months ago
- Crypt Breaker's Workbench☆18Updated 10 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- A collection of interesting ELF files for inspiration and testing☆29Updated 2 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- just give me a unix shell☆33Updated 3 years ago
- ARM is Turing-complete without data fetches☆57Updated 7 years ago
- Minimal setup to trigger the xz backdoor☆28Updated 9 months ago
- ld_preload userland rootkit☆34Updated 4 years ago
- A tweakable block cipher☆31Updated last year
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- USB armory - boot loader☆37Updated 4 months ago
- Tracks runtime instruction execution in Linux programs☆34Updated 11 years ago
- Architectural privilege escalation on x86☆60Updated 7 years ago
- A possible method for faster-than-light communication☆43Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last month
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆24Updated 2 years ago
- x86 assembler in 512 bytes of x86 machine code☆35Updated 5 years ago
- AES-256-CBC Encrypt and Decrypt Functions in VBScript☆59Updated 2 years ago