Sc00bz / break-uheprng
Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)
☆11Updated 7 years ago
Alternatives and similar repositories for break-uheprng:
Users that are interested in break-uheprng are comparing it to the libraries listed below
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆18Updated 5 months ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- executing JS from x86 code☆27Updated 5 years ago
- ☆29Updated 6 years ago
- 100% XXTEA authenticated, chunked file encryption☆18Updated 4 years ago
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- ☆12Updated 2 years ago
- ☆12Updated 5 years ago
- A tweakable block cipher☆31Updated 11 months ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 8 months ago
- Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)☆25Updated 2 years ago
- RFC8484 and DoH/JSON resolver☆40Updated last year
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- ☆13Updated 4 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated last month
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆10Updated 3 weeks ago
- Minimal setup to trigger the xz backdoor☆27Updated 6 months ago
- Tiny LZW implementations in assembly☆14Updated last year
- ☆26Updated 2 years ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆9Updated last year
- NASM macOS translation of the source code listings distributed with the Art of 64-bit Assembly Language book.☆16Updated last year
- Slides from Public Talks☆18Updated 3 years ago