Sc00bz / break-uheprngLinks
Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)
☆11Updated 7 years ago
Alternatives and similar repositories for break-uheprng
Users that are interested in break-uheprng are comparing it to the libraries listed below
Sorting:
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Updated 5 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated last week
- encrypted-linux-kernel-modules☆12Updated 5 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Tracks runtime instruction execution in Linux programs☆36Updated 12 years ago
- Parses DNS responses in a secure, rigorous manner☆22Updated 5 years ago
- chroot environments, done in a more elegant way☆11Updated 2 years ago
- data-at-rest updatable threshold encryption KMS server and client☆22Updated 2 months ago
- executing JS from x86 code☆27Updated 6 years ago
- Intro to Assembly Optimization stream repo☆26Updated 4 years ago
- Contains over 375 samples of Windows Portable Executable (PE) files ranging from the common to the completely esoteric with detailed orig…☆45Updated last year
- ☆12Updated 2 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 7 months ago
- Debugger and analyzer for ARM ELF executables.☆18Updated 3 years ago
- Architectural privilege escalation on x86☆61Updated 7 years ago
- Detect x86 shellcode in files and traffic.☆25Updated 7 years ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- just give me a unix shell☆35Updated 3 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆10Updated 6 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 10 years ago
- An example of how to parse an ELF symbol table.☆15Updated 9 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 6 months ago
- ☆36Updated last year
- Minimal setup to trigger the xz backdoor☆29Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated 2 years ago
- 100% XXTEA authenticated, chunked file encryption☆18Updated 4 years ago
- Moovbox Mismanagement Utilities☆15Updated 10 years ago