An implementation of the Salsa20 stream cipher in C99
☆119Jul 29, 2016Updated 9 years ago
Alternatives and similar repositories for salsa20
Users that are interested in salsa20 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C++ implementation of stream cypher Salsa20☆22Feb 1, 2015Updated 11 years ago
- ChaCha20 stream cipher in C☆33Mar 25, 2024Updated 2 years ago
- KeePass Salsa20 Cipher Plugin☆24Apr 13, 2016Updated 10 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- High performance, header only C++17 implementation of the ChaCha encryption.☆17Dec 26, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 4 months ago
- ChaCha20 stream cipher implemented in C☆89Feb 1, 2025Updated last year
- FPE - Format Preserving Encryption with FF3 in C☆14Apr 3, 2026Updated last month
- x64dbg plugin for cleaning Themida Mutation Assembly codes.☆19May 14, 2025Updated 11 months ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 10 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- AVX implementation of the Skinny block cipher☆12Apr 24, 2022Updated 4 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- Windows工具类☆28Apr 23, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants☆38Mar 3, 2021Updated 5 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Implementation of Trivium Stream Cipher in Python☆17Jan 23, 2018Updated 8 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- An application for obtaining, dumping and modifying token from user land.☆27Nov 21, 2015Updated 10 years ago
- Implementations of a fast Message-Authentication Code☆121Sep 28, 2022Updated 3 years ago
- Prince cipher source code in C99 and test vectors with intermediate values☆15May 22, 2021Updated 4 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 11 years ago
- An efficient software implementation of the block cipher PRESENT for 8-bit platforms☆14Jun 11, 2013Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Chacha20Poly1305 AEAD☆17Mar 15, 2015Updated 11 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Some example source code for fixed IE11 sandbox escapes.☆142Aug 21, 2014Updated 11 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- A cryptographically secure pseudorandom number generator cli tool printing in a wide variety of byte encodings (hex, base64,..) and for m…☆14Sep 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 11 years ago
- ☆18May 18, 2018Updated 7 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Jan 21, 2020Updated 6 years ago
- Simple anti-tamper embedded into a simple string encryption.☆10Mar 7, 2019Updated 7 years ago
- A Skein and Threefish software suite for C, Java, and Go☆70Aug 31, 2015Updated 10 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago