Sc00bz / break-uheprngLinks
Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)
☆11Updated 7 years ago
Alternatives and similar repositories for break-uheprng
Users that are interested in break-uheprng are comparing it to the libraries listed below
Sorting:
- A tiny, portable implementation of the IPCrypt specification in C.☆31Updated this week
- ☆12Updated 2 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Updated 5 years ago
- data-at-rest updatable threshold encryption KMS server and client☆21Updated last month
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- ☆30Updated 7 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- A tweakable block cipher☆31Updated last year
- Tracks runtime instruction execution in Linux programs☆35Updated 12 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 6 months ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 6 years ago
- Modify a message to have a desired CRC signature.☆125Updated 4 years ago
- Architectural privilege escalation on x86☆60Updated 7 years ago
- ☆12Updated 3 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- executing JS from x86 code☆27Updated 6 years ago
- ROP gadget finder and analysis in pure Javascript☆27Updated 3 years ago
- Intro to Assembly Optimization stream repo☆26Updated 4 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 10 years ago
- An example of how to parse an ELF symbol table.☆15Updated 9 years ago
- A possible method for faster-than-light communication☆43Updated last year
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- encrypted-linux-kernel-modules☆12Updated 5 years ago
- Encodes data into printable Unicode characters.☆90Updated 7 months ago
- Detect x86 shellcode in files and traffic.☆25Updated 7 years ago
- A cache hard password hash/KDF☆48Updated last year
- RFC8484 and DoH/JSON resolver☆42Updated 2 years ago