Simple constant-time AES implementation
☆123Jan 21, 2025Updated last year
Alternatives and similar repositories for ctaes
Users that are interested in ctaes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 5 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Bitcoin Core's univalue branch (no longer used)☆16May 30, 2022Updated 3 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆110Mar 25, 2024Updated 2 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆13Dec 26, 2024Updated last year
- ☆21Feb 22, 2025Updated last year
- External repository for Bitcoin Core related maintenance tools☆160Apr 8, 2026Updated last week
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- ☆49May 12, 2021Updated 4 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- SLPs for the ToSC Volume 2017 Issue 4 paper 'Shorter Linear Straight-Line Programs for MDS Matrices'☆21Oct 16, 2021Updated 4 years ago
- Admin to Kernel code execution using the KSecDD driver☆263Apr 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- Beacon Debugger☆55Oct 28, 2024Updated last year
- Some tools to inspect the lightning network☆15Jan 7, 2022Updated 4 years ago
- A PoC implementation of a multiparty vault architecture☆29Jan 31, 2021Updated 5 years ago
- A runtime for developing large-scale and complex shellcode.☆22Mar 31, 2026Updated 2 weeks ago
- ☆84Aug 26, 2024Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆140Sep 12, 2022Updated 3 years ago
- Malware?☆76Oct 26, 2025Updated 5 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A list of exceptionally good cryptography libraries that inspire our work☆15Jul 26, 2019Updated 6 years ago
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆145Mar 16, 2024Updated 2 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- ☆108Aug 21, 2024Updated last year
- Performing Indirect Clean Syscalls☆606Apr 19, 2023Updated 2 years ago
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 8 months ago
- An implementation of the SWIM gossip protocol in Rust using tokio-rs.☆14Mar 13, 2021Updated 5 years ago
- shadow tls client☆14Dec 30, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- TartarusGate, Bypassing EDRs☆661Jan 25, 2022Updated 4 years ago
- An example reference design for a proposed BOF PE☆205Jan 23, 2026Updated 2 months ago
- Hardware Spoofing & VirtualBox-Hardening x64 Bootkit☆21Dec 15, 2022Updated 3 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆444Dec 21, 2023Updated 2 years ago
- Compact linkable ring signatures. A modification on MLSAG.☆19May 10, 2020Updated 5 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Jan 1, 2026Updated 3 months ago