Sc00bz / break-uheprngLinks
Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)
☆11Updated 7 years ago
Alternatives and similar repositories for break-uheprng
Users that are interested in break-uheprng are comparing it to the libraries listed below
Sorting:
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Updated 5 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated 2 weeks ago
- Phorklift is an HTTP server and proxy daemon, with clear, powerful and dynamic configuration.☆45Updated 4 years ago
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆20Updated last year
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- PCILeech HP iLO4 Service☆24Updated 7 years ago
- ☆30Updated 7 years ago
- ☆12Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- chroot environments, done in a more elegant way☆11Updated 2 weeks ago
- data-at-rest updatable threshold encryption KMS server and client☆22Updated last week
- Minimal setup to trigger the xz backdoor☆29Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated 2 years ago
- Tracks runtime instruction execution in Linux programs☆36Updated 12 years ago
- encrypted-linux-kernel-modules☆12Updated 5 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 7 months ago
- ☆35Updated last year
- Contains over 375 samples of Windows Portable Executable (PE) files ranging from the common to the completely esoteric with detailed orig…☆45Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- World's First Haiku Ransomware/Malware☆15Updated last year
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- Tiny LZW implementations in assembly☆15Updated last year
- executing JS from x86 code☆27Updated 6 years ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 6 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- A cache hard password hash/KDF☆49Updated last year
- Architectural privilege escalation on x86☆61Updated 7 years ago
- Crypt Breaker's Workbench☆18Updated 11 years ago