An implementation of the Salsa20 stream cipher in C99
☆118Jul 29, 2016Updated 9 years ago
Alternatives and similar repositories for salsa20
Users that are interested in salsa20 are comparing it to the libraries listed below
Sorting:
- ☆15Jun 12, 2015Updated 10 years ago
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- KeePass Salsa20 Cipher Plugin☆24Apr 13, 2016Updated 9 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- High performance, header only C++17 implementation of the ChaCha encryption.☆17Dec 26, 2017Updated 8 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 2 months ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Jan 21, 2020Updated 6 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Feb 8, 2019Updated 7 years ago
- Windows工具类☆28Apr 23, 2017Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A small collection of scripts that I've written for various needs.☆30Feb 2, 2026Updated last month
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- ☆18May 18, 2018Updated 7 years ago
- Hardware keylogger dongle with built-in Wi-Fi for live keystroke capture/injection and other fun stuff☆21May 13, 2016Updated 9 years ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆18Jan 17, 2026Updated last month
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- POC of sysenter x64 LSTAR MSR hook☆41Jul 20, 2014Updated 11 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- Tool to analyze iOS crash reports☆29Jan 12, 2014Updated 12 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- implementation of OEIS sequences☆11Nov 30, 2016Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- ☆12May 22, 2018Updated 7 years ago
- 微软7月布丁增加内存 延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Some of example code that I have collected while learning☆10Sep 25, 2016Updated 9 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Simple anti-tamper embedded into a simple string encryption.☆10Mar 7, 2019Updated 7 years ago
- ☆12Feb 24, 2023Updated 3 years ago