C++ console application that features unique (at least I think so) symmetric key based file encryption algorithm.
☆53May 17, 2022Updated 3 years ago
Alternatives and similar repositories for THCrypt
Users that are interested in THCrypt are comparing it to the libraries listed below
Sorting:
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- Python script thats reads RFID card tags from USB ID-20 reader and verifies them against a SQLite db.☆42Dec 19, 2020Updated 5 years ago
- ☆11Jun 2, 2015Updated 10 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Yet another proxy router☆13Updated this week
- Big unsigned integers (128, 256, 384, 512 or more bits), big (signed) integers and big decimal numbers.☆12Mar 4, 2024Updated 2 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- ☆11May 13, 2019Updated 6 years ago
- Reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants☆36Mar 3, 2021Updated 5 years ago
- GOST R 34.12-2015 encryption algorithms implemented as loadable modules for Linux kernel☆13Jun 11, 2023Updated 2 years ago
- Packaging a serving up a Vue.js application via Go and Statik☆10Nov 23, 2017Updated 8 years ago
- High performance, header only C++17 implementation of the ChaCha encryption.☆17Dec 26, 2017Updated 8 years ago
- kj is a small collection of stb inspired libs.☆18Apr 5, 2018Updated 7 years ago
- ☆11Apr 5, 2025Updated 11 months ago
- Klipper is a 3d-printer firmware☆11Jul 7, 2023Updated 2 years ago
- A sample app using mithril access itunes api☆12Aug 1, 2016Updated 9 years ago
- FreeBSD daemon that watches files and runs commands when they change☆15Jan 30, 2023Updated 3 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- Elegant and efficient error handling and reporting patterns for C☆10Oct 9, 2016Updated 9 years ago
- A Skein and Threefish software suite for C, Java, and Go☆69Aug 31, 2015Updated 10 years ago
- Rust bindings to libopus☆18Updated this week
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- This includes standard algorithms and Data Structures in Computer Science .☆13Dec 3, 2018Updated 7 years ago
- Easy to use, modern symmetric encryption on the command line☆10May 26, 2016Updated 9 years ago
- AssetRipper plugin to make it easy to export Valheim to a Unity project.☆16Nov 9, 2023Updated 2 years ago
- ☆18Apr 13, 2025Updated 11 months ago
- x100 faster implementation of GOST 34.12-2015 Kuznyechik optimized for high throughput and low latency on SSE2-capable CPUs☆22Jun 21, 2019Updated 6 years ago
- Zig bindings for the `libuv` library☆13Jan 19, 2023Updated 3 years ago
- Simple handler for bypass battleye in 5 seconds☆11May 23, 2021Updated 4 years ago
- Polygonus - Brain board for FOME ecus☆17Mar 13, 2026Updated last week
- Pythonista HTTP server with SSL, and basic auth☆36Jan 17, 2016Updated 10 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- VMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when th…☆15May 20, 2020Updated 5 years ago
- Plugin framework and general utilities for V Rising mods.☆11Jun 6, 2023Updated 2 years ago
- Git-style subcommands done right☆10Oct 20, 2018Updated 7 years ago
- 微信自动点赞☆10Dec 18, 2016Updated 9 years ago