Simple constant-time AES implementation
☆124Jan 21, 2025Updated last year
Alternatives and similar repositories for ctaes
Users that are interested in ctaes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 5 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Bitcoin Core's univalue branch (no longer used)☆16May 30, 2022Updated 3 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆111Mar 25, 2024Updated 2 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆14Dec 26, 2024Updated last year
- ☆21Feb 22, 2025Updated last year
- External repository for Bitcoin Core related maintenance tools☆159Apr 8, 2026Updated last month
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- ☆49May 12, 2021Updated 4 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- SLPs for the ToSC Volume 2017 Issue 4 paper 'Shorter Linear Straight-Line Programs for MDS Matrices'☆21Oct 16, 2021Updated 4 years ago
- Admin to Kernel code execution using the KSecDD driver☆269Apr 19, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- Beacon Debugger☆55Oct 28, 2024Updated last year
- Some tools to inspect the lightning network☆15Jan 7, 2022Updated 4 years ago
- A PoC implementation of a multiparty vault architecture☆29Jan 31, 2021Updated 5 years ago
- A runtime for developing large-scale and complex shellcode.☆22Updated this week
- ☆84Aug 26, 2024Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆141Sep 12, 2022Updated 3 years ago
- Malware?☆76Oct 26, 2025Updated 6 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆18Mar 4, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A list of exceptionally good cryptography libraries that inspire our work☆15Jul 26, 2019Updated 6 years ago
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆146Mar 16, 2024Updated 2 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Performing Indirect Clean Syscalls☆612May 2, 2026Updated last week
- ☆109Aug 21, 2024Updated last year
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 8 months ago
- An implementation of the SWIM gossip protocol in Rust using tokio-rs.☆14Mar 13, 2021Updated 5 years ago
- shadow tls client☆14Dec 30, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An example reference design for a proposed BOF PE☆206Jan 23, 2026Updated 3 months ago
- TartarusGate, Bypassing EDRs☆663Jan 25, 2022Updated 4 years ago
- Hardware Spoofing & VirtualBox-Hardening x64 Bootkit☆20Dec 15, 2022Updated 3 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆326Jun 18, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Jan 1, 2026Updated 4 months ago
- Compact linkable ring signatures. A modification on MLSAG.☆20May 10, 2020Updated 5 years ago